International audienceInternet of Things (IoT) is growing too fast and it is being deployed in various domains such as Smart Homes, Smart City, Healthcare, etc. Security in IoT environments is critical, as information between IoT devices and end-users needs to be shared securely. Therefore, IoT systems require protecting two critical aspects, which are confidential data and identity management. However, IoT devices have many constraints, including limitations in computation, power, memory and energy. In this paper, we present a fast and secure authenticated key agreement protocol based on elliptic curve cryptography. The proposed protocol is used for distributed IoT applications. Therefore, a Trusted Third Party (TTP) is used to perform the...
The emerging Internet of Things (IoT) technology interconnects billions of embedded devices with eac...
We propose an authentication and key agreement protocol for wireless communication based on elliptic...
Computational complexity of public key cryptography over sensor nodes is not anymore a blocking conc...
International audienceInternet of Things (IoT) is growing too fast and it is being deployed in vario...
The rapid advancement in the field of wireless sensor and cellular networks have established a rigid...
Internet of Things(IoT) consist of interconnected devices for transmitting and receiving the data ov...
Today, the Internet of Things can be described as the fastest-growing network that offers applicatio...
In recent years, the elliptic curve cryptosystems (ECC) have received attention due to their increas...
The concept of the Internet of Things is driven by advancements of the Internet with the interconnec...
[[abstract]]In a smart living environment, a person can use various intelligent devices to obtain hi...
Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and aut...
Authentication protocols for resource-constrained devices constitute a significant issue facing the ...
The Internet of Things (IoT) has become an intriguing trend worldwide as it allows any smart device ...
The Internet of Things (IoT) has become an important technology which permits different devices and ...
In the Internet-driven world, not only computers but things also get connected. It also allows the t...
The emerging Internet of Things (IoT) technology interconnects billions of embedded devices with eac...
We propose an authentication and key agreement protocol for wireless communication based on elliptic...
Computational complexity of public key cryptography over sensor nodes is not anymore a blocking conc...
International audienceInternet of Things (IoT) is growing too fast and it is being deployed in vario...
The rapid advancement in the field of wireless sensor and cellular networks have established a rigid...
Internet of Things(IoT) consist of interconnected devices for transmitting and receiving the data ov...
Today, the Internet of Things can be described as the fastest-growing network that offers applicatio...
In recent years, the elliptic curve cryptosystems (ECC) have received attention due to their increas...
The concept of the Internet of Things is driven by advancements of the Internet with the interconnec...
[[abstract]]In a smart living environment, a person can use various intelligent devices to obtain hi...
Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and aut...
Authentication protocols for resource-constrained devices constitute a significant issue facing the ...
The Internet of Things (IoT) has become an intriguing trend worldwide as it allows any smart device ...
The Internet of Things (IoT) has become an important technology which permits different devices and ...
In the Internet-driven world, not only computers but things also get connected. It also allows the t...
The emerging Internet of Things (IoT) technology interconnects billions of embedded devices with eac...
We propose an authentication and key agreement protocol for wireless communication based on elliptic...
Computational complexity of public key cryptography over sensor nodes is not anymore a blocking conc...