2022
DOI: 10.1109/jiot.2021.3083731
|View full text |Cite
|
Sign up to set email alerts
|

Hash-MAC-DSDV: Mutual Authentication for Intelligent IoT-Based Cyber–Physical Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 51 publications
(27 citation statements)
references
References 28 publications
0
27
0
Order By: Relevance
“…The secure hash algorithm is an encryption technology [ 10 ]. It is to transform the input of any length into an output of a fixed length through a hash algorithm, and the output is the hash value.…”
Section: Design and Innovation Of Internet Information Security Platf...mentioning
confidence: 99%
“…The secure hash algorithm is an encryption technology [ 10 ]. It is to transform the input of any length into an output of a fixed length through a hash algorithm, and the output is the hash value.…”
Section: Design and Innovation Of Internet Information Security Platf...mentioning
confidence: 99%
“…The hardware support environment of the online intelligent teaching art resource platform based on the clustering analysis algorithm is based on the clustering analysis algorithm data center, structured storage, unstructured storage, and resource underlying services composed of highperformance computing servers and high-performance storage devices, and resource service open access framework; the second part is the front-end business cluster supported by the virtual computing platform to provide users with access to the operation interface [19][20][21][22]. Follow the principles of completeness, clarity, understanding, query ability, and ease of operation.…”
Section: Hardware Support Environment Of the Online Intelligentmentioning
confidence: 99%
“…The proposed method ensures both the authentication and the integrity of the message with packet loss and delay minimized, throughput and packet delivery rate maximized. To allow mutual authentication between two network nodes in [9] the authors proposed a mutual Hash-MAC-DSDV scheme by making a modification of the DSDV protocol. This scheme adopts a structure of a cluster network where the CH nodes facilitate the registration of nodes in a local channel at first and broadcast it via nodes called base stations to register it in a second called public channel.…”
Section: Cryptographic Techniquesmentioning
confidence: 99%