2020
DOI: 10.3390/electronics9030520
|View full text |Cite
|
Sign up to set email alerts
|

An Anonymous Device to Device Authentication Protocol Using ECC and Self Certified Public Keys Usable in Internet of Things Based Autonomous Devices

Abstract: Two party authentication schemes can be good candidates for deployment in Internet of Things (IoT)-based systems, especially in systems involving fast moving vehicles. Internet of Vehicles (IoV) requires fast and secure device-to-device communication without interference of any third party during communication, and this task can be carried out after registration of vehicles with a trusted certificate issuing party. Recently, several authentication protocols were proposed to enable key agreement in two party se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
24
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 21 publications
(24 citation statements)
references
References 37 publications
0
24
0
Order By: Relevance
“…They analyzed and revealed security pitfalls of protocols by Islam and Biswas [7] and Mandal et al [8]. In this article, we demonstrate that the protocol proposed by Alzahrani et al [6] suffers from some problems in design and is insecure against insider attacks, key compromise attack, and fails to provide anonymity. On the other hand, the proposed protocol by Li et al [9] for D2D-based communication is elaborated here and is shown to be vulnerable against key compromise attack and replay attack.…”
Section: Introductionmentioning
confidence: 68%
See 1 more Smart Citation
“…They analyzed and revealed security pitfalls of protocols by Islam and Biswas [7] and Mandal et al [8]. In this article, we demonstrate that the protocol proposed by Alzahrani et al [6] suffers from some problems in design and is insecure against insider attacks, key compromise attack, and fails to provide anonymity. On the other hand, the proposed protocol by Li et al [9] for D2D-based communication is elaborated here and is shown to be vulnerable against key compromise attack and replay attack.…”
Section: Introductionmentioning
confidence: 68%
“…Also, Chaudhry et al' protocol [10] cannot counter the clogging attack. Thus, a novel protocol for D2D communications without the presence of a trusted third party to improve protocols by Alzahrani et al [6], Chaudhry et al [10], and Li et al [9] is proposed here. The proposed protocol is highly efficient and secure.…”
Section: Introductionmentioning
confidence: 99%
“…Key Compromise Impersonation Attacks. Key compromise impersonation attacks [38] mean that adversary A knows the long-term key of one entity and tries to impersonate the other entity. Here, we assume that A obtains the longterm private key x of GWN.…”
Section: Cryptanalysis Of Wu Et Al's Protocolmentioning
confidence: 99%
“…Furthermore, as the adaption of e-Healthcare increases, the need of patient-privacy should be the first priority as all the communication is taking place through public channel [6], [7]. To prevent various threats, an authentication scheme can be implemented to ensure that TMIS are only accessed by legitimate users [8]- [11]. Recently, Wu et al [12] introduced a two-factor authentication scheme by employing smart-card and password for TMIS.…”
Section: Introductionmentioning
confidence: 99%