2020
DOI: 10.1002/spe.2826
|View full text |Cite
|
Sign up to set email alerts
|

PSSCC: Provably secure communication framework for crowdsourced industrial Internet of Things environments

Abstract: Summary Internet of things environment is adopted widely in different industries and business organizations with varying capacity. It provides a favorable environment to outsource the crowdsourced data in the cloud to minimize the cost of computation, which is called crowdsourcing. Crowdsourcing is a technique where individuals or organizations obtain goods and services. A professional or industry outsource the crowdsourced data in the cloud, where confidentiality and authenticity of data become essential. Sig… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(18 citation statements)
references
References 43 publications
(66 reference statements)
0
18
0
Order By: Relevance
“…The author here shows that their scheme is suitable for IoT based cloud. Several applications have been proposed on remote user authentication technique, some of which are utilized for real time applications such as IoT [10]. Teh et al [26] proposed an authentication technique for IoT that uses Lockitron.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…The author here shows that their scheme is suitable for IoT based cloud. Several applications have been proposed on remote user authentication technique, some of which are utilized for real time applications such as IoT [10]. Teh et al [26] proposed an authentication technique for IoT that uses Lockitron.…”
Section: Related Workmentioning
confidence: 99%
“…Dharminder et al [11] No No Yes No No No No No Yes Yes Chaturadevi et al [6] Yes No Yes No No No No No No Yes Nikooghadam et al [17] Yes No Yes No Yes No Yes Yes Yes Yes Chandrakar et al [5] No Yes No No No No No No No Yes Sutrala et al [25] Yes No Yes No Yes Yes Yes Yes Yes Yes Dharminder et al [10] Yes No Yes No Yes Yes Yes Yes Yes Yes Li et al [15] Yes No Yes No No No Yes Yes Yes Yes Das et al [8] Yes No Yes No No No Yes Yes Yes Yes Sharma et al [23] No No Yes Yes Yes Yes Yes Yes Yes Yes Proposed Scheme No No No No No No No No No No A1: Server masquerading attack A2: Replay attack A3: Biometric recognition error A4:Mutual Authentication A5: Client Impersonation attack A6: Offline password guessing attack A7: Slow wrong password detection A8: Prone to DoS attack A9: Id Guessing attack A10: Lack of session key agreement 4.1.1. Server masquerading attack: Suppose an attacker tries to masquerade a legitimate server, he must send login request.…”
Section: Table 2 Cryptanalysis On Various Authentication Schemesmentioning
confidence: 99%
See 3 more Smart Citations