A Code based Light-weight Authentication Scheme for IoT in Fog Computing Environment

作者: Hemanta Kumar Kalita , Kumar Sekhar Roy

DOI:

关键词:

摘要:

参考文章(15)
Leslie Lamport, Constructing Digital Signatures from a One Way Function SRI International. ,(2016)
Ming-Chin Chuang, Meng Chang Chen, An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics Expert Systems With Applications. ,vol. 41, pp. 1411- 1418 ,(2014) , 10.1016/J.ESWA.2013.08.040
Kaiping Xue, Changsha Ma, Peilin Hong, Rong Ding, A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks Journal of Network and Computer Applications. ,vol. 36, pp. 316- 323 ,(2013) , 10.1016/J.JNCA.2012.05.010
Bin Wang, Maode Ma, A Smart Card Based Efficient and Secured Multi-Server Authentication Scheme Wireless Personal Communications. ,vol. 68, pp. 361- 378 ,(2013) , 10.1007/S11277-011-0456-7
Debiao He, Shuhua Wu, Security Flaws in a Smart Card Based Authentication Scheme for Multi-server Environment Wireless Personal Communications. ,vol. 70, pp. 323- 329 ,(2013) , 10.1007/S11277-012-0696-1
Leslie Lamport, Password authentication with insecure communication Communications of The ACM. ,vol. 24, pp. 770- 772 ,(1981) , 10.1145/358790.358797
Luca Viganò, Automated Security Protocol Analysis With the AVISPA Tool Electronic Notes in Theoretical Computer Science. ,vol. 155, pp. 61- 86 ,(2006) , 10.1016/J.ENTCS.2005.11.052
Omaimah Bamasag, Kamal Youcef Toumi, Efficient multicast authentication in internet of things 2016 International Conference on Information and Communication Technology Convergence (ICTC). pp. 429- 435 ,(2016) , 10.1109/ICTC.2016.7763512
Chandu Thota, Revathi Sundarasekar, Gunasekaran Manogaran, Varatharajan R, Priyan M. K., Centralized Fog Computing Security Platform for IoT and Cloud in Healthcare System IGI Global. pp. 141- 154 ,(2018) , 10.4018/978-1-5225-2947-7.CH011