作者
Nusrat H Shah, Durdana T Khan, Arshia A Banu, Lubna H Shah
发表日期
2023/1/16
期刊
International Journal of Intelligent Systems and Applications in Engineering
卷号
11
期号
1
页码范围
254-260
简介
IoT applications such as smart homes can monitor and control users' household chores anytime and anywhere. Similarly, Body Area Networks (BANs) can monitor the physical condition of a patient via various wearable sensors. Several authentication protocols have been proposed for embedded devices based on hash chains, symmetric cryptography, or PKC (public-key cryptography). Nevertheless, approaches based on hash chains and symmetric cryptography require storing large amounts of data regarding user identities and equivalent symmetric ECC keys with an increase in the number of devices. More seriously, updating a user's key and establishing a session key in such a protocol is a complex task. The various key authentication protocol for internet of things are reviewed in this paper. The major techniques which are already been proposed are focused on the complexity of the authentication model.
引用总数
学术搜索中的文章
NH Shah, DT Khan, AA Banu, LH Shah - International Journal of Intelligent Systems and …, 2023