2020
DOI: 10.1002/dac.4570
|View full text |Cite
|
Sign up to set email alerts
|

Simple and secure device authentication mechanism for smart environments using Internet of things devices

Abstract: Enormous growth in digital electronics technology has paved path for the development of advanced networks, and smart environment is one among them. Smart environment is a network of smart devices connected to provide comfort, security, remote access and many more to end-users. Devices in smart environments usually collect very sensitive data of the end-users and disseminate it as required. The privacy of the end-user has to be ensured in these applications, and security becomes a prime concern. The security sy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 35 publications
(82 reference statements)
0
8
0
Order By: Relevance
“…They are immune to some types of attacks like MITM, Reply attacks, but some of the attacks like timing attacks, forgery attacks, and DoS are not considered. Shuai et al [14], Yu et al [15], Naoui et al [16], and Hussain et al [17] proposed a remote authentication scheme. They are using Identity as an authentication factor with a three-way authentication procedure; the application layer is responsible for authentication in these schemes.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…They are immune to some types of attacks like MITM, Reply attacks, but some of the attacks like timing attacks, forgery attacks, and DoS are not considered. Shuai et al [14], Yu et al [15], Naoui et al [16], and Hussain et al [17] proposed a remote authentication scheme. They are using Identity as an authentication factor with a three-way authentication procedure; the application layer is responsible for authentication in these schemes.…”
Section: Related Workmentioning
confidence: 99%
“…Different types of authentication phases are used such as installation, registration, login, and authentication, and password change phases except in Yu et al [15] scheme's the password change is not used. the schemes of Shuai et al [14] and Naoui et al [16], needs a secure channel for registration, and they are based on ECC encryption, while in the schemes of Yu et al [15] and Hussain et al [17], they are used pre-shared key for encryption and registration, also they are used pre-shared key for encryption and registration, also they based on XOR operation and one-way hash function. These schemes are immune to some types of attacks However, they are not immune to the DoS attack.…”
Section: Related Workmentioning
confidence: 99%
“…The specific characteristics of the smart environment, such as its ubiquitousness, invisibility, sense, or memory amplification, promote positive cultural transformations. The node in a wireless sensor and actuator networks (WSAN), Internet for Vehicles (IoV), Internet -Of -things (IoT), and other smart environments (smart households, smart buildings, hospitals, offices, and smart cities), etc., (Hussain and Jain (2020)). (Rugger et al (2020)) IoT devices, including low-power sensors, actuators, smartphones, tablets, and robots, can't be connected using current communication protocols because they are often battery-powered and resource-constrained.…”
Section: Al (2018))mentioning
confidence: 99%
“…erefore, the privacy of users and the confidentiality of sensitive data must be guaranteed. Device authentication, radio-frequency identification (RFID), and user authentication are security functions that must be provided in any IoT environment [144][145][146][147][148][149][150][151].…”
Section: Keyword Clustering and Evolution Of Research On Iotmentioning
confidence: 99%
“…Topic 6 corresponds to research on the development of user mutual authentication protocols for social IoT, IoTbased Long-Term Evolution (LTE), LTE-advanced networks, WSNs, and NFC (near-field communication) payment systems [144,[208][209][210][211][212][213][214][215][216][217][218]. In addition, the verification of authentication protocols using software tools, such as BAN and AVISPA, has gained popularity [213,214,217,[219][220][221].…”
Section: Identification Of Topics In Iot Securitymentioning
confidence: 99%