2019
DOI: 10.1016/j.procs.2020.01.042
|View full text |Cite
|
Sign up to set email alerts
|

Secure Hash Authentication in IoT based Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…However, this work may be compromised by security standards. Sharma et al developed a signature-generating technique [22] to authenticate sender and receiver transactions securely in IoT communication models. Here, the signature was generated through a well-known hashing algorithm, namely SHA-3 [23].…”
Section: Related Workmentioning
confidence: 99%
“…However, this work may be compromised by security standards. Sharma et al developed a signature-generating technique [22] to authenticate sender and receiver transactions securely in IoT communication models. Here, the signature was generated through a well-known hashing algorithm, namely SHA-3 [23].…”
Section: Related Workmentioning
confidence: 99%
“…In expression (7), the variable 𝐴 = 𝑓(πœ“23, 𝐡, 𝑆, 𝑅, 𝐿) and 𝐡 = 𝑓(πœ“22, 𝐡, 𝑆, 𝑅, 𝐿(𝐿 𝑖 22 )), where πœ“23/ πœ“22 represents binary XOR operation, 𝐡 represents a binary operation in rows over state bits, 𝑆 represents in-slice permutation over state bits, 𝑅 represents rotation over state bits 𝐿 represents linear operation with all input bits and single output bits. The above expression is slightly modified to include a fault in the form of π›₯𝐿_𝑖^22 to generate a fault hash of:…”
Section: Extensive Fault Analysismentioning
confidence: 99%
“…However, this secure communication area has a long history of achievements and failures. Several encoding messages have appeared over the eras and are continually broken after a while [7]. A cryptographic hash algorithm aims to provide secure communication using the digest of messages to generate a hash value of data to detect unauthorized attempts to data.…”
Section: Introductionmentioning
confidence: 99%
“…Biometrics and digital signatures are used to verify the authenticity and strengthen the security measures of transmission, which ensure integrity and prevent eavesdropping or interception as it is hard to decipher and tamper with the data. Hashing is also used to encrypt the data, as it converts the passwords into fixed-size strings of characters, a process that is irreversible as it is a one-way process [ 7 ]. In terms of access control, the data is secured by implementing defensive and secure mechanisms such as role-based access control, whose functionality is to restrict access to resources based on the user’s functional roles and responsibilities by revoking or enforcing the privilege-based access level provided.…”
Section: Introductionmentioning
confidence: 99%