2023
DOI: 10.1016/j.adhoc.2022.103003
|View full text |Cite
|
Sign up to set email alerts
|

A lightweight mutual and transitive authentication mechanism for IoT network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(12 citation statements)
references
References 45 publications
0
12
0
Order By: Relevance
“…72 Thus, Scyther tool has been incorporated to identify unreported weaknesses in IKEv1 and IKEv2, 74 unfold incorrect claims in ISO/IEC 11770-2:2008 and ISO/IEC 11770-3:2008, 75 and illustrate security attacks in ISO/IEC 9798 family. 76 Recently, Scyther tool has been utilized to analyze the security of authentication protocols designed for the Internet of Things, [77][78][79][80][81] 5th generation, [82][83][84][85][86] and wireless sensor network [87][88][89][90][91] architecture.…”
Section: Security Verification Using Scyther Toolmentioning
confidence: 99%
“…72 Thus, Scyther tool has been incorporated to identify unreported weaknesses in IKEv1 and IKEv2, 74 unfold incorrect claims in ISO/IEC 11770-2:2008 and ISO/IEC 11770-3:2008, 75 and illustrate security attacks in ISO/IEC 9798 family. 76 Recently, Scyther tool has been utilized to analyze the security of authentication protocols designed for the Internet of Things, [77][78][79][80][81] 5th generation, [82][83][84][85][86] and wireless sensor network [87][88][89][90][91] architecture.…”
Section: Security Verification Using Scyther Toolmentioning
confidence: 99%
“…As in previous work [11][12][13], choose an architecture where authentication is centralized at the gateway. The main advantage of this model is that it makes user authentication more convenient as you can directly interact with the sensor nodes without having to keep sending login messages.…”
Section: Authentication Modelmentioning
confidence: 99%
“…Krishnasrija et al's work [13] uses Chebyshev polynomials to improve security and time efficiency. In particular, their scheme provides transitive authentication to easily scale Iot-networks.…”
Section: Cryptanalysis Of Krishnasrija Et Al's Schemementioning
confidence: 99%
See 1 more Smart Citation
“…This [29] study proposes a mutual and transitive authentication mechanism for intermediate devices and gateways. The session key is verified using BAN logic, and the resilience against critical attacks is verified using the Scyther tool.…”
Section: Introductionmentioning
confidence: 99%