2017
DOI: 10.1109/access.2017.2766090
|View full text |Cite
|
Sign up to set email alerts
|

Seamless Key Agreement Framework for Mobile-Sink in IoT Based Cloud-Centric Secured Public Safety Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
43
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 72 publications
(43 citation statements)
references
References 45 publications
0
43
0
Order By: Relevance
“…After reviewing the existing mechanism of clustering optimization, the following are the open‐end research problems identified: Adoption of iterative approach: Majority of the existing mechanism have used iterative mechanism towards performing clustering operation. Multiple rounds of similar operation are carried out in recursive order for finding the best cluster head is witnessed.…”
Section: Research Problemmentioning
confidence: 99%
See 1 more Smart Citation
“…After reviewing the existing mechanism of clustering optimization, the following are the open‐end research problems identified: Adoption of iterative approach: Majority of the existing mechanism have used iterative mechanism towards performing clustering operation. Multiple rounds of similar operation are carried out in recursive order for finding the best cluster head is witnessed.…”
Section: Research Problemmentioning
confidence: 99%
“…In a challenging environment like terrain, it is essential to have better control of the topology. Mobility of sink node is one good option, but existing approaches [45][46][47][48][49][50] have diversified the focus on mobility limited to data aggregation and less towards the energy efficiency. Therefore, the applicability of such studies towards proper topology control cannot be claimed.…”
Section: Research Problemmentioning
confidence: 99%
“…Many researchers use the ECC algorithm to replace the traditional encryption algorithm in the identity authentication method. AL-Turjman et al [6] proposed a seamless secure authentication and key agreement (S-SAKA) method using bilinear pairing and elliptic curve cryptosystems. The method introduced a mobile receiver strategy to extend user authentication in cloud-based environments.…”
Section: Related Workmentioning
confidence: 99%
“…In the proposed DNA elliptical cryptography, standard elliptical curve parameters and methods have been chosen. Existing works in elliptical cryptography have shown its resilience towards timing and simple power analysis (SPA) attacks . The elliptical cryptography produces random data after decryption without a proper authentication key.…”
Section: Security Performancementioning
confidence: 99%
“…Therefore, encryption schemes for IoT systems need to be less complicated, and should function with reduced memory usage, which is dependent on the key size. Compared to conventional systems, elliptical curve cryptography (ECC) can statistically provide stronger security with a smaller key size, thus making it a suitable alternative for IoT devices . The strength of elliptical cryptography relies on the fact that the output of the decryption operation will be ambiguous without a proper authentication key.…”
Section: Introductionmentioning
confidence: 99%