2013
DOI: 10.1016/s1005-8885(13)60218-6
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced mutual authentication model of IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(3 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…In order to meet the demands of the Internet of Things with limited power resources, AES uses extensive encryption keys and complex calculations, which led to high power consumption [20]. A better approach of reciprocal authentication has been presented in [21] for environments using Internet of things. For the challenged answer on RFID authentication protocol in the distributed database environment, they suggested various enhancements to the authentication algorithm [22].…”
Section: Literature Reviews On Internet Of Thingsmentioning
confidence: 99%
“…In order to meet the demands of the Internet of Things with limited power resources, AES uses extensive encryption keys and complex calculations, which led to high power consumption [20]. A better approach of reciprocal authentication has been presented in [21] for environments using Internet of things. For the challenged answer on RFID authentication protocol in the distributed database environment, they suggested various enhancements to the authentication algorithm [22].…”
Section: Literature Reviews On Internet Of Thingsmentioning
confidence: 99%
“…A device authentication technique is proposed in [ 113 ] by using the SVM classifier model while keeping [ 115 ] as their base model. The sensors and gateway communications in an IoMT architecture are secured by machine learning in trust management strategies and authentication techniques.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Compared with EU FP7SENSEI, G. Fortina object abstraction and dynamic coordination, the model and some algorithm not only maintain IoT services stability and reliability, but also support the service dynamic composition. According to the E. G. da Silva dynamic service composition and S. C. Geyik robust dynamic sensor service composition, Y a n g, P a n g and Z h a n g [4] propose a life cycle-based distributed service description and dynamic composition model and its algorithm for a large heterogeneity, unstructured datadriver service, and decentralization service composition of atomic sensor service. Each PRA is abstracted into semantic service by metadata in sensor service description, which enhances robustness of service.…”
Section: Introductionmentioning
confidence: 99%