Autor: |
H. Shah, Nusrat, T. Khan, Durdana, A. Banu, Arshia, H. Shah, Lubna |
Jazyk: |
angličtina |
Rok vydání: |
2023 |
Předmět: |
|
Zdroj: |
International Journal of Intelligent Systems and Applications in Engineering; Vol. 11 No. 1 (2023); 254-260 |
ISSN: |
2147-6799 |
Popis: |
IoT applications such as smart homes can monitor and control users' household chores anytime and anywhere. Similarly, Body Area Networks (BANs) can monitor the physical condition of a patient via various wearable sensors. Several authentication protocols have been proposed for embedded devices based on hash chains, symmetric cryptography, or PKC (public-key cryptography). Nevertheless, approaches based on hash chains and symmetric cryptography require storing large amounts of data regarding user identities and equivalent symmetric ECC keys with an increase in the number of devices. More seriously, updating a user's key and establishing a session key in such a protocol is a complex task. The various key authentication protocol for internet of things are reviewed in this paper. The major techniques which are already been proposed are focused on the complexity of the authentication model. |
Databáze: |
OpenAIRE |
Externí odkaz: |
|