2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW) 2015
DOI: 10.1109/nsitnsw.2015.7176384
|View full text |Cite
|
Sign up to set email alerts
|

One time password authentication scheme based on elliptic curves for Internet of Things (IoT)

Abstract: Establishing end-to-end authentication between devices and applications in Internet of Things (IoT) is a challenging task. Due to heterogeneity in terms of devices, topology, communication and different security protocols used in IoT, existing authentication mechanisms are vulnerable to security threats and can disrupt the progress of IoT in realizing Smart City, Smart Home and Smart Infrastructure, etc. To achieve end-to-end authentication between IoT devices/applications, the existing authentication schemes … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
47
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 120 publications
(51 citation statements)
references
References 12 publications
(18 reference statements)
1
47
0
Order By: Relevance
“…Other works discuss secure healthcare architecture and communication of nodes in a Constrained Application Protocol (CoAP; an application layer protocol that is prepared for use in Internet devices in IoT smart homes, such as wireless sensor network nodes) network [19], as well as security challenges between heterogeneous devices and different applications in smart homes [7]. Some studies focus on password security and applications for IoT smart home systems [20] [21], secure software updates in smart home devices, and security system devices (e.g., surveillance cameras) and their use in smart homes [22]. Home automation and security threats are also defined, A new solution is presented to address risk reduction in cases of privacy breaches in smart energy management systems [23].…”
Section: High (H)mentioning
confidence: 99%
“…Other works discuss secure healthcare architecture and communication of nodes in a Constrained Application Protocol (CoAP; an application layer protocol that is prepared for use in Internet devices in IoT smart homes, such as wireless sensor network nodes) network [19], as well as security challenges between heterogeneous devices and different applications in smart homes [7]. Some studies focus on password security and applications for IoT smart home systems [20] [21], secure software updates in smart home devices, and security system devices (e.g., surveillance cameras) and their use in smart homes [22]. Home automation and security threats are also defined, A new solution is presented to address risk reduction in cases of privacy breaches in smart energy management systems [23].…”
Section: High (H)mentioning
confidence: 99%
“…internet and GSM for the exchange of authentication messages. Several OTP generation mechanisms [34] [42] have been seen patented but their standardization is still a challenge owing to the assorted usage format as well as the architectures put forward by former protocol makers and researchers.…”
Section: Related Workmentioning
confidence: 99%
“…The number of associated strategies in the world is set to produce from 20 billion to 80 billion in the following five years. Storage planetary is now flowing to a more dispersed cloud contribution [16][17] [18].…”
Section: ) Managing Waste Materialsmentioning
confidence: 99%