Smart City Gnosys

Smart city article details

Title A Survey Of Authenticated Key Agreement Protocols For Securing Iot
ID_Doc 5129
Authors Mohammad Z.; Abusukhon A.; Qattam T.A.
Year 2019
Published 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology, JEEIT 2019 - Proceedings
DOI http://dx.doi.org/10.1109/JEEIT.2019.8717529
Abstract Internet of Things (IoT) is defined as an inanimate object which is designed with built-in wireless connectivity, and monitored, controlled and linked over the internet. As any new technology, IoT is confusing for the normal consumer especially as debates swirl around standardization, security and privacy. This paper presents the IoT applications such as home automation, healthcare, smart grid, smart city and smart car and focuses on how to secure the generated data by IoT devices from an unauthorized access. The IoT consists of devices which are constrained in their computational capability, network bandwidth, packet size and memory such as sensor nodes. This paper demonstrates that a lightweight and mutual authentication protocols are a fundamental building block for providing the mutual authentication between user and devices in the IoT applications. Furthermore, this paper surveys some of authenticated key agreement protocols for securing IoT and presents a comparison between them in terms of security and performance. © 2019 IEEE.
Author Keywords Authentication; Cryptography; Elliptic curve cryptosystem; Internet-of-Things; Sensors; Wireless sensor network


Similar Articles


Id Similarity Authors Title Published
47601 View0.896Badar H.M.S.; Mahmood K.; Akram W.; Ghaffar Z.; Umar M.; Das A.K.Secure Authentication Protocol For Home Area Network In Smart Grid-Based Smart CitiesComputers and Electrical Engineering, 108 (2023)
32963 View0.891Dargaoui S.; Azrour M.; El Allaoui A.; Guezzaz A.; Alabdulatif A.; Alnajim A.Internet Of Things Authentication Protocols: Comparative StudyComputers, Materials and Continua, 79, 1 (2024)
8038 View0.887Singh S.; Singh A.An Enhanced Authenticated Key Agreement Scheme For Cloud-Based Iot In Wireless Sensor NetworksInternational Journal of Electrical and Electronics Research, 11, 4 (2023)
4458 View0.887Abi-Char P.E.; Nader P.; Mahfouz S.A Secure And Lightweight Authenticated Key Agreement Protocol For Distributed Iot Applications2020 43rd International Conference on Telecommunications and Signal Processing, TSP 2020 (2020)
2933 View0.885Li N.; Liu D.; Nepal S.; Pei G.A Needle In A Haystack: Finding A Suitable Lightweight Iot Authentication Protocol And Improving Its UsabilityProceedings - 2020 2nd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2020 (2020)
4954 View0.874Vidwans A.; Ramaiya M.A Study And Comparison Of Cryptographic Mechanisms On Data Communication In Internet Of Things (Iot) Network And DevicesLecture Notes in Networks and Systems, 894 (2024)
4501 View0.872Mercy S.S.; Prabhu C.; Revathi V.; Kumar K.S.; Anitha G.A Secure Iot Based Wireless Sensor Network For An Efficient Modified User Authentication And Key Agreement SchemeIEEE 1st International Conference on Ambient Intelligence, Knowledge Informatics and Industrial Electronics, AIKIIE 2023 (2023)
35247 View0.871Ahmed W.K.; Mohammed R.S.Lightweight Authentication Methods In Iot: SurveyProceedings of the 2nd 2022 International Conference on Computer Science and Software Engineering, CSASE 2022 (2022)
47934 View0.87Padmavathi V.; Saminathan R.Security For The Internet Of ThingsComputer and Information Security Handbook, Fourth Edition: Volumes 1-2, 1 (2024)
5123 View0.869Zhang W.; Zeng F.; Tao Y.; Li X.A Survey For Security Of Iot Wireless Protocols; [物联网无线协议安全综述]Journal of Cyber Security, 7, 2 (2022)