2019
DOI: 10.1016/j.adhoc.2019.101948
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced authentication and key management scheme for securing data transmission in the internet of things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
37
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 65 publications
(38 citation statements)
references
References 29 publications
0
37
0
Order By: Relevance
“…There are some schemes (such as [34,35]) for preventing the node replication attacks. In our scheme, the BS pre- In Figure 5, our scheme has a lower computational cost than schemes [13,15,17]. Du et al's scheme lacks location information protection and message authentication during the session key establishment process and, thus, has the lowest computational cost.…”
Section: Security Performance Discussionmentioning
confidence: 97%
See 2 more Smart Citations
“…There are some schemes (such as [34,35]) for preventing the node replication attacks. In our scheme, the BS pre- In Figure 5, our scheme has a lower computational cost than schemes [13,15,17]. Du et al's scheme lacks location information protection and message authentication during the session key establishment process and, thus, has the lowest computational cost.…”
Section: Security Performance Discussionmentioning
confidence: 97%
“…Harbi et al [17] proposed a key management scheme that can ensure network data transmission security by enhancing authentication during key establishment. The scheme found that the Inter-Cluster Multiple Key Distribution Scheme for Wireless Sensor Network (ICMDS) [18] has the problem where it cannot implement the calculation of the session key.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In this section we presented the comparative analysis of the proposed work with Mutual Authentication and Key Agreement (MAKA) scheme presented by Harbi et al [38] in the year 2019 and few other authentication and key agreement schemes. For comparison, we have considered the operations related to key generation process of LSSCW.…”
Section: A Comparative Analysismentioning
confidence: 99%
“…related to the LSSCW scheme and other schemes presented in [16], [17], [35], [38], [40]- [45]. LSSCW is more efficient than [35], [38], [40], [43]- [45] in terms of time requirement. The LSSCW performance is 0.1058 ms which is far better than the performance of [44] which is 4.475 ms.…”
Section: A Comparative Analysismentioning
confidence: 99%