2015
DOI: 10.7840/kics.2015.40.10.1958
|View full text |Cite
|
Sign up to set email alerts
|

Chameleon Hash-Based Mutual Authentication Protocol for Secure Communications in OneM2M Environments

Abstract: modification, deletion, etc.) has been issued as an important requirement. In this paper, we propose a mutual authentication protocol for secure communications chameleon hash based on the M2M environment. The results of performance analysis efficiency is encryption and decryption an average of 0.7%, calculated rate showed good results as compared to the target algorithm, equivalent to a 3%(Average 0.003 seconds) difference, mutual authentication and encryption region by using the key update advantage of ECC(El… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2018
2018

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…The security in the IoT environment must be guaranteed; otherwise, it may lead to life-threatening problems as well as violation of privacy. However, most IoT devices are vulnerable to attack because security issues are not considered [2,3].…”
Section: Introductionmentioning
confidence: 99%
“…The security in the IoT environment must be guaranteed; otherwise, it may lead to life-threatening problems as well as violation of privacy. However, most IoT devices are vulnerable to attack because security issues are not considered [2,3].…”
Section: Introductionmentioning
confidence: 99%