© 2019 Current authentication protocols seek to establish authenticated sessions over insecure channels while maintaining a small footprint considering the energy consumption and computational overheads. Traditional authentication schemes must store a form of authentication data on the devices, putting this data at risk. Approaches based on purely public/private key infrastructure come with additional computation and maintenance costs. This work proposes a novel non-interactive zero-knowledge (NIZKP) authentication protocol that incorporates the limiting factors in IoT communication devices and sensors. Our protocol considers the inherent network instability and replaces the ZKP NP-hard problem using the Merkle tree structure for the creati...
The Internet of Things (IoT) demands authentication systems which can provide both security and usab...
The Internet of Things (IoT) demands authentication systems which can provide both security and usab...
The Internet of Things (IoT) demands authentication systems which can provide both security and usab...
© 2019 Current authentication protocols seek to establish authenticated sessions over insecure chann...
© 2019 Current authentication protocols seek to establish authenticated sessions over insecure chann...
© 2019 Current authentication protocols seek to establish authenticated sessions over insecure chann...
© 2019 Current authentication protocols seek to establish authenticated sessions over insecure chann...
Current authentication protocols seek to establish authenticated sessions over insecure channels whi...
This is an accepted manuscript of an article published by Elsevier in Ad hoc Networks on 21/08/2019,...
Current authentication protocols seek to establish authenticated sessions over insecure channels whi...
open access journalThe Internet of Things (IoT) can includes many resource-constrained devices, with...
Full text of this book chapter is not available due to publisher's copyright restrictions.Zero-knowl...
Upgradation of technologies for sustainable smart cities has led to rapid growth in Internet of Thin...
Upgradation of technologies for sustainable smart cities has led to rapid growth in Internet of Thin...
The Internet of Things (IoT) is increasingly affecting human lives in multiple profound ways. “Thing...
The Internet of Things (IoT) demands authentication systems which can provide both security and usab...
The Internet of Things (IoT) demands authentication systems which can provide both security and usab...
The Internet of Things (IoT) demands authentication systems which can provide both security and usab...
© 2019 Current authentication protocols seek to establish authenticated sessions over insecure chann...
© 2019 Current authentication protocols seek to establish authenticated sessions over insecure chann...
© 2019 Current authentication protocols seek to establish authenticated sessions over insecure chann...
© 2019 Current authentication protocols seek to establish authenticated sessions over insecure chann...
Current authentication protocols seek to establish authenticated sessions over insecure channels whi...
This is an accepted manuscript of an article published by Elsevier in Ad hoc Networks on 21/08/2019,...
Current authentication protocols seek to establish authenticated sessions over insecure channels whi...
open access journalThe Internet of Things (IoT) can includes many resource-constrained devices, with...
Full text of this book chapter is not available due to publisher's copyright restrictions.Zero-knowl...
Upgradation of technologies for sustainable smart cities has led to rapid growth in Internet of Thin...
Upgradation of technologies for sustainable smart cities has led to rapid growth in Internet of Thin...
The Internet of Things (IoT) is increasingly affecting human lives in multiple profound ways. “Thing...
The Internet of Things (IoT) demands authentication systems which can provide both security and usab...
The Internet of Things (IoT) demands authentication systems which can provide both security and usab...
The Internet of Things (IoT) demands authentication systems which can provide both security and usab...