2019 IEEE International Conference on RFID (RFID) 2019
DOI: 10.1109/rfid.2019.8719256
|View full text |Cite
|
Sign up to set email alerts
|

Configurable Anonymous Authentication Schemes For The Internet of Things (IoT)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…Further, with the burgeoning growth of Internet of Things (IoT) security and blockchain ecosystems, the integration of ZKPs is surfacing as a critical trend [7]. The maturity of this model and its effective implementation present a potential solution to offset limitations inherent in blockchain ecosystems [8].…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Further, with the burgeoning growth of Internet of Things (IoT) security and blockchain ecosystems, the integration of ZKPs is surfacing as a critical trend [7]. The maturity of this model and its effective implementation present a potential solution to offset limitations inherent in blockchain ecosystems [8].…”
Section: Literature Reviewmentioning
confidence: 99%
“…ZKPs bear the potential to significantly bolster IoT security and privacy. Scholars such as Rasheed et al [8] advocate for the use of configurable models employing ZKPs for enhancing IoT security, whilst Cui et al [9] emphasise the role of ZKPs in ensuring privacy in blockchain-based systems. The exploration of ZKP applications such as Zerocoin, Zerocash, Hawk, and Bolt is also documented [10,11].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Simulation results show that the proposed method is secure and efficient compared with other authentication methods for moving devices. Configurable unidentified authentication methods for the IoTs is suggested in [123], where the author explains the two configurable S&P preserving authentication methods zero knowledge proof and common secret encoding and performance is assessed in terms of delay and power consumption. A secure pairing for devices by means of Wi-Fi signals is proposed in [124], where two devices automatically authenticate and acquire shared key consistent with the CSI of the Wi-Fi signal.…”
Section: A Encoding Authentication In Discoverymentioning
confidence: 99%
“…The wireless communication is more vulnerable to malicious adversaries, which causes user privacy disclosure and security threats (Cha and Yeh, 2018;Alotaibi, 2019). Many schemes have been proposed to address these problems, some for IoT (Rasheed et al, 2019;Alotaibi, 2019), some for SCM (Ahamed et al, 2020;Ren et al, 2016) and some for medical system (Youssef et al, 2019;Mehra et al, 2018;Sanchez et al, 2019;Safkhani and Vasilakos, 2019).…”
Section: Introductionmentioning
confidence: 99%