2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP) 2018
DOI: 10.1109/iccwamtip.2018.8632587
|View full text |Cite
|
Sign up to set email alerts
|

An Authentication Technique Based on Oauth 2.0 Protocol for Internet of Things (IoT) Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
4
0
2

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 16 publications
0
4
0
2
Order By: Relevance
“…where r ∈ [0, 1], α replaces r and b swaps 1 − r. Equations ( 9)- (11) are the same as our standard notations, as mentioned in equation (1).…”
Section: Preliminaries About Cosine Functionmentioning
confidence: 99%
See 1 more Smart Citation
“…where r ∈ [0, 1], α replaces r and b swaps 1 − r. Equations ( 9)- (11) are the same as our standard notations, as mentioned in equation (1).…”
Section: Preliminaries About Cosine Functionmentioning
confidence: 99%
“…It deprived of human interaction and instigated industrial perspective such as industrial Internet of ings (IIoT) [1][2][3][4][5][6][7][8]. ese applications are well-organized integral sensor-based IoT architecture which is behaving well-informed accosted systems, such as smart cities (SC), smart healthcare system (SHM), smart wireless-multimedia sensor network (SWMSN), smart homes (SH), remote monitoring on farm animals (RMFA), automobiles, drone monitoring system (DMS), smart industry surveillance system (SIS), agricultural crop monitoring system (ACMS), pain monitoring system (PMS), self-driving vehicles (SV), and smart transportation system (STS) [9][10][11][12][13][14][15][16][17]. ese treasured research and innovation parturitions as a high processing skill set in terms of the intelligent operational IIoT ecology, which is well suited to meaningful communication through the environs.…”
Section: Introductionmentioning
confidence: 99%
“…Currently, IAM systems are effective mechanisms for reducing cloud-based risks. Many institutions provide an IAM system to ensure information through the influence of each user's access authorization [20]- [22]. SailPoint, IBM, Oracle, RSA as well as Core security are the most popular IAM system providers.…”
Section: Preliminariesmentioning
confidence: 99%
“…A configurable and easily integrable proposal was made in (Cirani et al, 2014) which proposes an architecture targeting HTTP/CoAP that provides an authorization framework which can be integrated with an external oauth-based authorization service (OAS) collaboratively making it the IoT-OAS architecture. (Khan et al, 2018) proposed an authentication scheme based on the OAuth 2.0 protocol to secure the IoT network by providing an authentication service. (Fremantle and Aziz, 2016) proposed model for IoT using OAuth 2.0 protocol which allowed the identity of users and devices on the network to be federated.…”
Section: Related Workmentioning
confidence: 99%