scispace - formally typeset
Journal ArticleDOI

A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment

Reads0
Chats0
TLDR
Security vulnerabilities of the multi-server cloud environment of the protocols proposed by Xue et al. and Chuang et al are shown and an informal cryptanalysis confirms that the protocol is protected against all possible security threats.
About
This article is published in Future Generation Computer Systems.The article was published on 2018-01-01. It has received 241 citations till now. The article focuses on the topics: Cloud computing security & Cloud computing.

read more

Citations
More filters
Journal ArticleDOI

Current research on Internet of Things (IoT) security: A survey

TL;DR: This paper presents an analysis of recent research in IoT security from 2016 to 2018, its trends and open issues, and the relevant tools, modellers and simulators.
Journal ArticleDOI

Internet of Things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile edge, and edge emerging computing paradigms: Disambiguation and research directions

TL;DR: This paper attempts to disambiguate emerging computing paradigms and explain how and where they fit in the above three areas of research and/or their intersections before it becomes a serious problem.
Journal ArticleDOI

A study on medical Internet of Things and Big Data in personalized healthcare system

TL;DR: The challenges in designing a better healthcare system to make early detection and diagnosis of diseases and the possible solutions while providing e-health services in secure manner are analyzed and possible future work guidelines are provided.
Journal ArticleDOI

Authentication Protocols for Internet of Things: A Comprehensive Survey

TL;DR: A comprehensive survey of authentication protocols for Internet of Things (IoT) is presented in this article, where more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail.
Journal ArticleDOI

The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey

TL;DR: This work formalizes the task of securing big data and its scope, provides a taxonomy to categories threats to fog-based IoT systems, presents a comprehensive comparison of state-of-the-art contributions in the field according to their security service and recommends promising research directions for future investigations.
References
More filters
Journal ArticleDOI

A public key cryptosystem and a signature scheme based on discrete logarithms

TL;DR: A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields.
Book ChapterDOI

Differential Power Analysis

TL;DR: In this paper, the authors examine specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. And they also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
Journal ArticleDOI

On the security of public key protocols

TL;DR: Several models are formulated in which the security of protocols can be discussed precisely, and algorithms and characterizations that can be used to determine protocol security in these models are given.
Journal ArticleDOI

Password authentication with insecure communication

TL;DR: A method of user password authentication is described which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system.
Journal ArticleDOI

A logic of authentication

TL;DR: This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols.
Related Papers (5)