2020
DOI: 10.1109/jiot.2019.2953549
|View full text |Cite
|
Sign up to set email alerts
|

LiKe: Lightweight Certificateless Key Agreement for Secure IoT Communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 58 publications
(31 citation statements)
references
References 34 publications
0
24
0
Order By: Relevance
“…Okada et al used indirect transmission in Zigbee and launched a low-rate denial of service attack that eluded the preventive measures [41]. In [42], the author proposed a certificate-less key agreement protocol that uses elliptic curve cryptography and prevents impersonating attacks.…”
Section: Zigbee Technologymentioning
confidence: 99%
See 1 more Smart Citation
“…Okada et al used indirect transmission in Zigbee and launched a low-rate denial of service attack that eluded the preventive measures [41]. In [42], the author proposed a certificate-less key agreement protocol that uses elliptic curve cryptography and prevents impersonating attacks.…”
Section: Zigbee Technologymentioning
confidence: 99%
“…Therefore, we have analyzed the existing literature related to Zigbee and identified that the protocol uses weak authentication in terms of installation code during the association phase [38], which makes the protocol vulnerable to a variety of attacks [39]. Researchers have proposed different approaches to ensure prevention against these attacks [35] [40] [42], but the proposed solution opens the door for new variants of cyber-attacks [41]. Therefore, we have proposed the ZigbeeSHF protocol, which considers the limitations of existing studies and provides prevention against different attacks, such as device control, eavesdropping, fake device injection, malicious insider, man-in-the-middle, masquerading, message tampering, privacy leakage, and replay.…”
Section: Analysis Of Literature Surveymentioning
confidence: 99%
“…The proposed framework can effectively defend against different types of prevalent exploits in IoT settings, including man-in-the-middle (MITM), eavesdropping, packet manipulation, replay, and known-key [ 37 ]. The proposed framework is secured against the MITM exploit by the mutual authentication provided by TLS for any communications between a station/AP and the [ 38 ].…”
Section: Secure Offloading Frameworkmentioning
confidence: 99%
“…The proposed framework is secured against the MITM exploit by the mutual authentication provided by TLS for any communications between a station/AP and the [ 38 ]. For eavesdropping attacks, even if an eavesdropper manages to capture any packets, the encryption mechanism ensures that the eavesdropper cannot extract any meaningful data from the sniffed packet [ 37 ]. This is because each packet is either part of the end-to-end TLS session or protected by a previously distributed pre-shared key between a station and its associated AP.…”
Section: Secure Offloading Frameworkmentioning
confidence: 99%
“…According to Statista’s [ 8 ] research institutions, there will be 31 billion connected devices by 2020 and 75 billion devices by 2025, which shows that the overall ecological development is rapid. While many IoT service platforms [ 9 , 10 , 11 ] have been developed to integrate these devices in recent years, most of them are nonstandard service and management architectures, which have potential security issues.…”
Section: Introductionmentioning
confidence: 99%