作者
Ummer Iqbal, Aditya Tandon, Sonali Gupta, Arvind R Yadav, Rahul Neware, Fraol Waldamichael Gelana
发表日期
2022
期刊
Wireless Communications and Mobile Computing
卷号
2022
期号
1
页码范围
7707543
出版商
Hindawi
简介
The integration of IoT with the cloud infrastructure is essential for designing smart applications. However, such integration may lead to security issues. Authentication and session key establishment is an essential security requirement for secure communication between IoT devices and cloud servers. For evaluating authentication key agreement schemes, the extended Canetti–Krawczyk (eCK) adversary model is regarded to be a more strict and relevant adversary model. Many schemes for authenticated key exchange between IoT devices and cloud servers have been proposed in the literature but have been assessed under Dolev and Yoa (DY) adversary model. Recently, Rostampour et al. introduced an ECC‐based approach for enabling authentication between IoT devices and cloud servers that is secure and robust to various attacks under the Dolev and Yoa adversary model. In this paper, a detailed review and …
引用总数
学术搜索中的文章
U Iqbal, A Tandon, S Gupta, AR Yadav, R Neware… - Wireless Communications and Mobile Computing, 2022