2022
DOI: 10.3390/s22197191
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Anonymous Authentication and Key Agreement Protocol Based on CoAP of Internet of Things

Abstract: To solve the problem regarding the lack of a lightweight and secure authentication and key agreement protocol in the Constrained Application Protocol of the Internet of Things environment, we explore the security flaws and applicability problems in the current related research. Then, we propose a new lightweight authentication and key agreement protocol based on the CoAP framework. The scheme adopts shared secret and elliptic curve public key technology, which ensures the anonymity of the communicators and pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 36 publications
0
11
0
Order By: Relevance
“…Blockchain: This domain distinguishes itself with a significant 12% contribution, as evidenced by research papers [6,14,[43][44][45][46][47][48][49][50][51][52] centering on secure authentication through decentralized identity, smart contracts, and cryptographic measures. The focus lies on fortifying security through innovative approaches.…”
Section: Types Of Publication Channelsmentioning
confidence: 99%
See 1 more Smart Citation
“…Blockchain: This domain distinguishes itself with a significant 12% contribution, as evidenced by research papers [6,14,[43][44][45][46][47][48][49][50][51][52] centering on secure authentication through decentralized identity, smart contracts, and cryptographic measures. The focus lies on fortifying security through innovative approaches.…”
Section: Types Of Publication Channelsmentioning
confidence: 99%
“…Communication: Leading with the highest percentage at 25%, the research papers [11,14,[43][44][45][46][47][48][49][50][51][52][53][54], in this domain delve into advancing secure communication protocols, sophisticated encryption techniques, and advanced authentication methods. The pronounced emphasis on secure communication underscores the domain's significance.…”
Section: Types Of Publication Channelsmentioning
confidence: 99%
“…CoAP [24], as defined by RFC 7252 [25], is another software framework optimized for low-power networks and devices. The server may send a verification query to ensure the client machine's 'hello' message came from a legitimate location.…”
Section: Coap-based Mechanismsmentioning
confidence: 99%
“…Gong et al in [117] proposed a lightweight protocol for authenticating and negotiating session keys. The proposed protocol uses shared secret and elliptic curve public key technology and is based on the CoAP framework [118].…”
Section: Security Protocols For the Internet Of Thingsmentioning
confidence: 99%
“…Medicine & health [81,82,85,90,91,[96][97][98]] Fog, edge, or cloud computing [100][101][102][103] Vehicular [130,131,134] Drones [135,136,140] Industrial [105,106,109,137,138] Multidomain [110,112,116,117,[121][122][123][124][126][127][128][129] Table 4 shows the attacks against which the described protocols for IoT are resistant. The table contains only those protocols for which the authors conducted formal and informal security evidence and indicated which attacks their proposed protocol is resistant to.…”
Section: Iot Solution Referencesmentioning
confidence: 99%