2020
DOI: 10.1007/s11277-020-07645-z
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Secure Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN in Unattended Scenarios

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…It uses the cryptographic algorithm based on the AES symmetric key to isolate the nodes which are not authorized and eligible to connect with the legitimate nodes or network. The authors in [19] presented a secret key distribution and detection method to provide resistance against the anti-capture attack. A secure group mobility scheme (SGMS) has been proposed in [20].…”
Section: Related Work and Motivationmentioning
confidence: 99%
See 3 more Smart Citations
“…It uses the cryptographic algorithm based on the AES symmetric key to isolate the nodes which are not authorized and eligible to connect with the legitimate nodes or network. The authors in [19] presented a secret key distribution and detection method to provide resistance against the anti-capture attack. A secure group mobility scheme (SGMS) has been proposed in [20].…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…Our proposed approach is designed to overcome the limitations in single node authentication schemes [17][18][19][20][21]. We propose a Secure Cluster-Based Authentication Scheme (CBAS) for 6LoWPAN based on the PMIPv6 (Proxy Mobile IPv6) developed by a working group NETLMM (Network-based localized mobility management) [22][23][24].…”
Section: Proposed Scheme and Contributionsmentioning
confidence: 99%
See 2 more Smart Citations
“…A cosine similarity-based AKE scheme for the IoT environment is proposed in [49]. Furthermore, to enable security and privacy in different IoT-based networks, various AKE schemes are reported in the exiting literature [19,[50][51][52][53][54][55][56][57][58][59][60][61][62][63][64][65][66].…”
Section: Related Workmentioning
confidence: 99%