2019
DOI: 10.1109/access.2019.2949649
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Authentication Protocol Using Smart Cards for the Internet of Things

Abstract: With the continuous development of IoT (Internet of Things) technology, IoT has become a typical representative of the development of new generation of information technology. The IoT allows people to use our data and computing resource anytime and everywhere. In the context of the IoT, the security of the vast amount of data generated by smart devices is one of the biggest concerns. To meet the challenge, the user authentication scheme in IoT should ensure the essential security performance protection and low… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 38 publications
0
7
0
Order By: Relevance
“…as the following is the evidence to proof that: Two numbers of hexadecimal are assumed CE and EF represented as 11001110 and 11101111 in binary respectively, the value x, that is the EXOR of CE and EF, could well be generated by adding CE to EF while performing an exclusive OR function on the two numbers. The process is illustrated, in the manner described below: It is possible to describe EF and CE as polynomial functions 𝑓(π‘˜) and 𝑓(π‘₯), at Galois Field, to be exact 2 8 (𝐺𝐹(2 8 )), in such a way that: 𝑓(π‘₯) = π‘₯ 7 + π‘₯ 6 + π‘₯ 5 + π‘₯ 3 + π‘₯ 2 + 1 = 𝐸𝐹 ( 18) 𝑓(π‘˜) = π‘₯ 7 + π‘₯ 5 + π‘₯ 4 + π‘₯ 3 + π‘₯ 2 + π‘₯ 1 + 1 = 𝐢𝐹 (19) Consequently, 𝑓(π‘₯) = 𝑓(π‘˜) βŠ• 𝑓(π‘₯) = π‘₯ 7 + π‘₯ 5 + π‘₯ 4 + π‘₯ 3 + π‘₯ 2 + π‘₯ 1 + 1 βŠ• π‘₯ 7 + π‘₯ 5…”
Section: Enhanced Invsubbytes Transformationmentioning
confidence: 99%
See 1 more Smart Citation
“…as the following is the evidence to proof that: Two numbers of hexadecimal are assumed CE and EF represented as 11001110 and 11101111 in binary respectively, the value x, that is the EXOR of CE and EF, could well be generated by adding CE to EF while performing an exclusive OR function on the two numbers. The process is illustrated, in the manner described below: It is possible to describe EF and CE as polynomial functions 𝑓(π‘˜) and 𝑓(π‘₯), at Galois Field, to be exact 2 8 (𝐺𝐹(2 8 )), in such a way that: 𝑓(π‘₯) = π‘₯ 7 + π‘₯ 6 + π‘₯ 5 + π‘₯ 3 + π‘₯ 2 + 1 = 𝐸𝐹 ( 18) 𝑓(π‘˜) = π‘₯ 7 + π‘₯ 5 + π‘₯ 4 + π‘₯ 3 + π‘₯ 2 + π‘₯ 1 + 1 = 𝐢𝐹 (19) Consequently, 𝑓(π‘₯) = 𝑓(π‘˜) βŠ• 𝑓(π‘₯) = π‘₯ 7 + π‘₯ 5 + π‘₯ 4 + π‘₯ 3 + π‘₯ 2 + π‘₯ 1 + 1 βŠ• π‘₯ 7 + π‘₯ 5…”
Section: Enhanced Invsubbytes Transformationmentioning
confidence: 99%
“…The majority of these linked objects utilize data communication protocols such as the MQTT protocol to exchange data. This emerging ecosystem introduces new concerns for communication security [6]. Such scenarios end-to-end protection is required, the design of which must take into account the limits of available bandwidth, computing power, memory, and power.…”
Section: Introductionmentioning
confidence: 99%
“…Nikooghadam and Amintoosi [41] have also suggested an ECC smart card security protocol, which satisfies two-factor mutual authentication at the same time offering key agreement, and showed that this protocol can successfully resist all the attacks. However, Shouqi et al [42] proved that the scheme of Nikooghadam and Amintoosi [41] fails to provide many security functions and cannot defend against many attacks. In addition, the protocol of Nikooghadam and Amintoosi [41] consumes more computational time than Zhao et al's [7] protocol.…”
Section: Literature Reviewmentioning
confidence: 99%
“…It is expected that by the end of 2022 will be 20.4 billions of IoT devices connected [7]. This new ecosystem raises new challenges in the security of its communications [8].…”
Section: Introductionmentioning
confidence: 99%