2021
DOI: 10.1002/cpe.6510
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight privacy‐aware secure authentication scheme for cyber‐physical systems in the edge intelligence era

Abstract: Internet of Things (IoT) and cyber‐physical systems demand proper real‐time data processing and analysis to fulfill the essential characteristics of seamless computing services such as less processing time, dynamic network management, and location awareness. With the evolution of mobile edge computing, numerous security and privacy issues have been addressed including policy management, authentication, access control, and confidentiality. The technologies such as big‐data, Internet of Things, and cloud have im… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 62 publications
0
2
0
Order By: Relevance
“…We have only included studies (including technical articles and excluding review-type articles) focused on both areas. Table 7 summarizes the methodologies and results of the applications [115][116][117][118][119][120][121][122][123][124][125][126][127].…”
Section: Recent Cps and Iot Applicationsmentioning
confidence: 99%
See 1 more Smart Citation
“…We have only included studies (including technical articles and excluding review-type articles) focused on both areas. Table 7 summarizes the methodologies and results of the applications [115][116][117][118][119][120][121][122][123][124][125][126][127].…”
Section: Recent Cps and Iot Applicationsmentioning
confidence: 99%
“…Center for threat-informed defense techniques with threat lists and mapped controls Only theoretical discussions were shared [117] An authentication scheme preserving light computational load, privacy, and security…”
Section: Applicationsmentioning
confidence: 99%
“…To protect the privacy of users, privacy-aware practices should be implemented [139]. This includes data anonymization techniques, informed consent processes, and adherence to privacy regulations and standards [140]- [143]. Minimizing the collection of personally identifiable information (PII) and implementing privacy-preserving data handling practices are essential.…”
Section: Figure 4 Wban Security Mechanismsmentioning
confidence: 99%
“…However, the patient's body data is often highly confidential, which poses significant challenges to the privacy protection of medical data. In Reference 10, Deebak et al proposed a lightweight privacy‐aware secure authentication (LPASA) scheme to address security breaches in medical data. LPASA utilizes lightweight cryptographic operations such as a one‐way hashing function and bitwise exclusive‐OR to improve security efficiency.…”
Section: Contentmentioning
confidence: 99%