2021
DOI: 10.1016/j.comnet.2021.108465
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight and secure authentication scheme for IoT network based on publish–subscribe fog computing model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
20
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
3

Relationship

1
9

Authors

Journals

citations
Cited by 57 publications
(31 citation statements)
references
References 41 publications
0
20
0
Order By: Relevance
“…Regarding studies that proposed security solutions, especially authentication for distributed MQTT architecture with multiple brokers, the authors in [23] presented a lightweight and secure authentication scheme for MQTT based on fog computing, which comprises multiple fog gateways as brokers. The scheme used the Elliptic Curve Diffie-Hellman Ephemeral (ECDHE) key exchange algorithm along with the pre-shared key (PSK).…”
Section: Related Workmentioning
confidence: 99%
“…Regarding studies that proposed security solutions, especially authentication for distributed MQTT architecture with multiple brokers, the authors in [23] presented a lightweight and secure authentication scheme for MQTT based on fog computing, which comprises multiple fog gateways as brokers. The scheme used the Elliptic Curve Diffie-Hellman Ephemeral (ECDHE) key exchange algorithm along with the pre-shared key (PSK).…”
Section: Related Workmentioning
confidence: 99%
“…In addition, it is expected to build the hardware basics for wireless equipment through reconfigurable and smart materials [124]. Rundowns of ML device-to-device (D2D) communication, gigantic MIMP optimization, and heterogeneous organize plan are given in [125][126][127][128][129][130][131][132][133][134][135]. Counterfeit insights can move forward to organize execution based on its solid learning and capacity to think [133][134][135][136].…”
Section: Tends On 6g Iov ML and Aimentioning
confidence: 99%
“…For instance, a Physical Clonable Functions (PUF)-based PUF-Cash Multiple Trusted Third Party (TTP) protocol is proposed for artificial intelligence (AI)-based Electronic Money [ 6 ], which leverages AI for the selection of an optimal subset of slave TTP for communication from the Master TTP for secure transaction. An extended Diffie–Hellman key exchange algorithm as a lightweight and secure authentication scheme based on MQTT subscribe and publish protocol is proposed for distributed fog computing in [ 7 ]. These software-based solutions address the issue of higher false alarms through changing the authentication protocol for the sensors.…”
Section: Introductionmentioning
confidence: 99%