2018
DOI: 10.1016/j.scs.2018.06.004
|View full text |Cite
|
Sign up to set email alerts
|

Provably secure pseudo-identity based device authentication for smart cities environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
18
0
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(20 citation statements)
references
References 48 publications
0
18
0
2
Order By: Relevance
“…The comparisons between our CAKE and ACAKE protocols and the related AKE protocols are listed in Table 2. The protocols in [11][12][13][14][15] are the related anonymous AKE protocols designed for smart cities, and all of them are two-factor authentication and do not provide compatible authentication and member revocation properties. The protocols in [16][17][18][19][20][21][22][23][24][25] are the related AKE protocols, which are suitable for multi-server environments; the protocols in [18][19][20][21][22] achieve independent authentication, but the protocols in [18,21] do not provide user anonymity.…”
Section: Comparisons and Performance Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…The comparisons between our CAKE and ACAKE protocols and the related AKE protocols are listed in Table 2. The protocols in [11][12][13][14][15] are the related anonymous AKE protocols designed for smart cities, and all of them are two-factor authentication and do not provide compatible authentication and member revocation properties. The protocols in [16][17][18][19][20][21][22][23][24][25] are the related AKE protocols, which are suitable for multi-server environments; the protocols in [18][19][20][21][22] achieve independent authentication, but the protocols in [18,21] do not provide user anonymity.…”
Section: Comparisons and Performance Analysismentioning
confidence: 99%
“…Li et al [11] proposed an authentication and key agreement scheme with user anonymity for a roaming service in a smart city in 2017, and their protocol did not provide multi-factor authentication, suitability for a multi-server environment, independent authentication, and member revocation. After that, both Li et al [12] and Reddy et al [13] proposed privacy-preserving authentication protocols for smart cities, which additionally achieved independent authentication as compared with Li et al's [11] protocol. In 2019, Xie and Hwang [14] proposed a two-factor anonymous roaming authentication scheme in a smart city, which additionally achieved suitability for a multi-server environment as compared with Li et al's [11] protocol.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…By the way, we know that 0.503 ms [51] is running time oft h . The total com-munication costs of the work of Chen et al [5], the work of Song et al [9], the work of Islam [16], the work of Sood et al [10], the work of Li et al [15], the work of Pan et al [50], the work of Reddy et al [48] and the work of Moon et al [49] and the proposed protocol are 2723.48 ms, 1815.35 ms, 2117.65 ms, 2721.25 ms, 3929.45 ms, 160.48 ms, 48.06 ms, 159.47 ms and 20.65 ms, respectively. The suggested protocol has by far the lowest interaction value, as evidenced by the study findings in Fig.…”
Section: Contrast With Other Protocols With Experimental Complexity Evaluationmentioning
confidence: 99%
“…Identity management frameworks and platforms are crucial for smart city applications [15], where interconnection of people, devices, and services is crucial for effective and reliable city operations. Researchers in [16] proposed a secure pseudo-identity based identification service for smart cities. Moreover, blockchain can be used for both identification and authentication purposes, as shown in [17].…”
Section: Related Workmentioning
confidence: 99%