2023
DOI: 10.1145/3586578
|View full text |Cite
|
Sign up to set email alerts
|

A Rubik's Cube Cryptosystem-based Authentication and Session Key Generation Model Driven in Blockchain Environment for IoT Security

Abstract: Over the past decade, IoT has gained huge momentum in terms of technological exploration, integration and its various applications even after having a resource-bound architecture. It is challenging to run any high-end security protocol(s) on Edge devices. These devices are highly vulnerable towards numerous cyber-attacks. IoT network nodes need peer-to-peer security which is possible if there exists proper mutual authentication among network devices. A secure session key needs to be established among source an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 69 publications
0
0
0
Order By: Relevance
“…The proposed technique enhances the security level of the Rubik's cube encryption technique. A t t k a n, R a n g a and A h l a w a t [14] discuss the challenges of running high-end security protocols on resource-bound Edge devices in the context of the growing importance of the Internet of Things (IoT). To ensure peer-to-peer security among IoT network nodes, proper mutual authentication is necessary, and a secure session key must be established between source and destination nodes before sending sensitive data.…”
Section: Introductionmentioning
confidence: 99%
“…The proposed technique enhances the security level of the Rubik's cube encryption technique. A t t k a n, R a n g a and A h l a w a t [14] discuss the challenges of running high-end security protocols on resource-bound Edge devices in the context of the growing importance of the Internet of Things (IoT). To ensure peer-to-peer security among IoT network nodes, proper mutual authentication is necessary, and a secure session key must be established between source and destination nodes before sending sensitive data.…”
Section: Introductionmentioning
confidence: 99%