2022
DOI: 10.1007/978-981-19-0901-6_1
|View full text |Cite
|
Sign up to set email alerts
|

GKEAE: Group Key Exchange and Authentication with ECC in Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…Several techniques in place cannot be implemented on this layer, therefore, there is need for improvement. It has also been discovered that the ECC technique can be used to secure other layers of the IOT as well [42].…”
Section: Research Gapmentioning
confidence: 99%
“…Several techniques in place cannot be implemented on this layer, therefore, there is need for improvement. It has also been discovered that the ECC technique can be used to secure other layers of the IOT as well [42].…”
Section: Research Gapmentioning
confidence: 99%
“…Therefore, there is a need for improvement. It has also been discovered that the ECC technique can secure other layers of the IoT [38]. Several researchers have proposed a novel technique to secure IoT devices and networks from different points of view.…”
Section: Related Workmentioning
confidence: 99%
“…Integrating access authentication and data transfer improves the serviceability of IoT devices. The GKEAE delivers a faster group key distribution computation time than the quick authentication system (Padmashree et al, 2022).…”
Section: Introductionmentioning
confidence: 99%