The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2018
DOI: 10.1109/jiot.2017.2787800
|View full text |Cite
|
Sign up to set email alerts
|

A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
118
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 176 publications
(127 citation statements)
references
References 29 publications
0
118
0
Order By: Relevance
“…14) Energy Management: Energy management for the IIoT and WSANs has naturally received significant attention, as in many cases the devices operate on limited battery supplies (Table VIII). On the IIoT part, there have been energy efficient improvements on QoS-aware services composition [372] (similarly for the ICPS [386]), robust authentication protocols [392], routing and data collection [393], [394], as well as resource allocation and utilization [395] (similarly for the ICPS [398]). On the backbone of the IIoT networks, in the cases where Ethernet is used as an enabler, energy efficiency has also been a timely topic [375].…”
Section: Computation and Data Analytics Articlesmentioning
confidence: 99%
See 1 more Smart Citation
“…14) Energy Management: Energy management for the IIoT and WSANs has naturally received significant attention, as in many cases the devices operate on limited battery supplies (Table VIII). On the IIoT part, there have been energy efficient improvements on QoS-aware services composition [372] (similarly for the ICPS [386]), robust authentication protocols [392], routing and data collection [393], [394], as well as resource allocation and utilization [395] (similarly for the ICPS [398]). On the backbone of the IIoT networks, in the cases where Ethernet is used as an enabler, energy efficiency has also been a timely topic [375].…”
Section: Computation and Data Analytics Articlesmentioning
confidence: 99%
“…IIoT / ICPS [372], [386], [392], [393], [366], [367], [375], [394], [395], [398] WSAN [369]- [371], [377], [396], [373], [374], [376], [378], [379], [381] NCS -Industrial Robots [384] Assembly Line [62], [364], [365], [383], [385], [387], [6], [388]- [391], [399] M2M Communication [368], [397] whole toward minimizing energy consumption is proposed in [384]. Dynamic low-power reconfiguration [364] and machine energy consumption minimization [365] are key objectives of novel assembly lines.…”
Section: Data Enabling Technology Articles On Energy Managementmentioning
confidence: 99%
“…The role and importance of the security and authentication is growing every day with the growth of technology specially with the emergence of IoT . However, modern technology faces serious issues due to problems in security and authentication.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, an increase in network size leads to a higher number of route discoveries and additional transmission delays. Furthermore, robust and energy efficient authentication protocol for industrial IoT [44] presented three-factor authentication and provides data security for WSN. The proposed solution offers proper mutual authentication between nodes, however, unnecessary energy is consumed during the authentication process and compromised network lifetime.…”
Section: Related Work and Research Formulationmentioning
confidence: 99%