2021
DOI: 10.1371/journal.pone.0258279
|View full text |Cite
|
Sign up to set email alerts
|

A secure remote user authentication scheme for 6LoWPAN-based Internet of Things

Abstract: One of the significant challenges in the Internet of Things (IoT) is the provisioning of guaranteed security and privacy, considering the fact that IoT devices are resource-limited. Oftentimes, in IoT applications, remote users need to obtain real-time data, with guaranteed security and privacy, from resource-limited network nodes through the public Internet. For this purpose, the users need to establish a secure link with the network nodes. Though the IPv6 over low-power wireless personal area networks (6LoWP… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 21 publications
(9 citation statements)
references
References 67 publications
0
7
0
Order By: Relevance
“…In [23], a resource efficient authentication scheme is proposed for remote users in Internet Of Things (IOT), to achieve authentication for remote users. This facilitates the network entities and users for establishing private session keys.…”
Section: Related Workmentioning
confidence: 99%
“…In [23], a resource efficient authentication scheme is proposed for remote users in Internet Of Things (IOT), to achieve authentication for remote users. This facilitates the network entities and users for establishing private session keys.…”
Section: Related Workmentioning
confidence: 99%
“…Constraint (9) restricts that the task execution time of each task n i on MEC M j cannot exceed its task completion time. constraint (10) qualifies the non-negativity of all parameters.…”
Section: Local Executionmentioning
confidence: 99%
“…In IoT edge computing, since the task generation process is highly dynamic, statistics are difficult to obtain or accurately predict [10,11]. Chen et al [12] proposed a dynamic computation offloading algorithm based on stochastic optimization.…”
Section: Introductionmentioning
confidence: 99%
“…Most existing identity authentication schemes in IoT environment are based the operations such as bilinear pairing, public key encryption and decryption, and symmetric encryption [8], [9], [10], [11], [12], [13], [14]. Although these schemes are flexible, they impose high overhead and require high resources for the running entity.…”
Section: Introductionmentioning
confidence: 99%