Skip to main content
Erschienen in: Cluster Computing 4/2022

02.11.2021

A secure authentication technique for connecting different IoT devices in the smart city infrastructure

verfasst von: Rohit Sharma, Rajeev Arya

Erschienen in: Cluster Computing | Ausgabe 4/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recently the IoT technology is widely used in the field of smart cities, smart banking, and smart transportation system, etc. Various sensors can be installed in an open environment which allows users to collect the information in an easy way using the internet of things. However, due to the open environment, it’s really difficult to provide security to the communicated information. In this paper, a secure authentication technique is presented for connecting different IoT devices in the smart city infrastructure. This technique shows the legitimacy of IoT sensors (IOi) to the reader (Ri) and Authentication Entity. In this paper, a set of primitives and the cubic equation are used to propose a secure authentication technique. In the proposed technique, an authentication entity is introduced between the IoT sensor and the receiver. The authentication entity will be responsible for performing the authentication process. The proposed authentication technique includes a strong mathematical procedure, which is very complex. The computational cost and Energy cost have also been analyzed and compared with previous techniques. It is providing a secure authentication process for the different IoT sensors, which is useful to start a secure communication with the receiver. The proposed technique offers the best computation and energy cost in comparison with the previous techniques.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Pouryazdan, M., Kantarci, B.: The smart citizen factor in trustworthy smart city crowdsensing. IT Professional 18(4), 26–33 (2016)CrossRef Pouryazdan, M., Kantarci, B.: The smart citizen factor in trustworthy smart city crowdsensing. IT Professional 18(4), 26–33 (2016)CrossRef
5.
Zurück zum Zitat Mohurle, S., Patil, M.: A brief study of wannacry threat: ransomware attack. Int. J. 8(5), 1938–1940 (2017) Mohurle, S., Patil, M.: A brief study of wannacry threat: ransomware attack. Int. J. 8(5), 1938–1940 (2017)
7.
Zurück zum Zitat Angrishi, K.: Turning internet of things (IoT) into internet of vulnerabilities (IoV): IoT botnets (2017). Preprint at arXiv:1702.03681 Angrishi, K.: Turning internet of things (IoT) into internet of vulnerabilities (IoV): IoT botnets (2017). Preprint at arXiv:​1702.​03681
9.
Zurück zum Zitat Nam, T., Pardo, T.A. Smart city as urban innovation: focusing on management, policy, and context. In: Proceedings of the 5th international conference on theory and practice of electronic governance. pp. 185–194. ACM, (2011) Nam, T., Pardo, T.A. Smart city as urban innovation: focusing on management, policy, and context. In: Proceedings of the 5th international conference on theory and practice of electronic governance. pp. 185–194. ACM, (2011)
12.
Zurück zum Zitat Zhang, Z.K., Cho, M.C.Y., Wang, C.W., Hsu, C.W., Chen, C.K., & Shieh, S. (2014). IoT security: ongoing challenges and research opportunities. In: 2014 IEEE 7th international conference on service-oriented computing and applications. https://doi.org/10.1109/SOCA.2014.58. Zhang, Z.K., Cho, M.C.Y., Wang, C.W., Hsu, C.W., Chen, C.K., & Shieh, S. (2014). IoT security: ongoing challenges and research opportunities. In: 2014 IEEE 7th international conference on service-oriented computing and applications. https://​doi.​org/​10.​1109/​SOCA.​2014.​58.
14.
Zurück zum Zitat Maciag, M., Wogan, J.: With less state aid, localities look for ways to cope. Governing 30, 32–37 (2017) Maciag, M., Wogan, J.: With less state aid, localities look for ways to cope. Governing 30, 32–37 (2017)
16.
Zurück zum Zitat Recommendation for key management—Part 1: general: Recommendation for key management—part 1: General. Gaithersburg, MD, USA, Special Publication, pp. 800–857 (2005) Recommendation for key management—Part 1: general: Recommendation for key management—part 1: General. Gaithersburg, MD, USA, Special Publication, pp. 800–857 (2005)
18.
Zurück zum Zitat Lim, H.W., Robshaw, M.J.B.: (2004) On Identity-Based Cryptography and Grid Computing. In: Bubak, M., van Albada G.D., Sloot P.M.A., Dongarra J.: (eds) Computational Science - ICCS 2004. Lecture Notes in Computer Science, vol 3036. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24685-5_69 Lim, H.W., Robshaw, M.J.B.: (2004) On Identity-Based Cryptography and Grid Computing. In: Bubak, M., van Albada G.D., Sloot P.M.A., Dongarra J.: (eds) Computational Science - ICCS 2004. Lecture Notes in Computer Science, vol 3036. Springer, Berlin, Heidelberg. https://​doi.​org/​10.​1007/​978-3-540-24685-5_​69
19.
Zurück zum Zitat Lim, H.W., & Robshaw, M. (2005). A dynamic key infrastructure for GRID. In: Proc. EGC255–264 Lim, H.W., & Robshaw, M. (2005). A dynamic key infrastructure for GRID. In: Proc. EGC255–264
20.
Zurück zum Zitat Mao, W.: An identity-based non-interactive authentication framework for computational grids. HP Labs Tech. Rep. HPL, Palo Alto, pp. 2004–2096 (2004) Mao, W.: An identity-based non-interactive authentication framework for computational grids. HP Labs Tech. Rep. HPL, Palo Alto, pp. 2004–2096 (2004)
21.
Zurück zum Zitat Ahmad, A., Paul, A., Khan, M., Jabbar, S., Rathore, M.M.U., Chilamkurti, N., et al.: Energy efficient hierarchical resource management for mobile cloud computing. IEEE Trans. Sustain. Comput. 2(2), 100–112 (2017)CrossRef Ahmad, A., Paul, A., Khan, M., Jabbar, S., Rathore, M.M.U., Chilamkurti, N., et al.: Energy efficient hierarchical resource management for mobile cloud computing. IEEE Trans. Sustain. Comput. 2(2), 100–112 (2017)CrossRef
22.
Zurück zum Zitat Chen, T.H., Yeh, H.L., Shih, W.K. An advanced ECC dynamic IDbasedremotemutual authentication scheme for cloud computing. In: Proceedings 5th FTRA international conference on multimedia and ubiquitous engineering, pp. 155–159 (2011) Chen, T.H., Yeh, H.L., Shih, W.K. An advanced ECC dynamic IDbasedremotemutual authentication scheme for cloud computing. In: Proceedings 5th FTRA international conference on multimedia and ubiquitous engineering, pp. 155–159 (2011)
23.
Zurück zum Zitat Goriparthia, T., Das, M.L., Saxena, A.: An improved bilinear pairing based remote user authentication scheme. Comput. Stand. Interfaces 31, 181–185 (2009)CrossRef Goriparthia, T., Das, M.L., Saxena, A.: An improved bilinear pairing based remote user authentication scheme. Comput. Stand. Interfaces 31, 181–185 (2009)CrossRef
24.
Zurück zum Zitat Das, M.L., Saxena, A., Gulati, V.P., Phafstak, D.B.: A novel remote user authentication scheme using bilinear pairings. Comput. Secur. 25, 184–189 (2006)CrossRef Das, M.L., Saxena, A., Gulati, V.P., Phafstak, D.B.: A novel remote user authentication scheme using bilinear pairings. Comput. Secur. 25, 184–189 (2006)CrossRef
25.
Zurück zum Zitat Khan Pathan, S., Hong, C.S., Hee, K.: Bilinear-pairing-based remote user authentication schemes using smart cards. In: Proceedings of the 3rd international conference on ubiquitous information management and communication, pp. 356–361 (2009) Khan Pathan, S., Hong, C.S., Hee, K.: Bilinear-pairing-based remote user authentication schemes using smart cards. In: Proceedings of the 3rd international conference on ubiquitous information management and communication, pp. 356–361 (2009)
26.
Zurück zum Zitat Sun, H., Wen, Q., Zhang, H., Jin, Z.: A novel remote user authentication and key agreement scheme for mobile client–server environment. Appl. Math. Inf. Sci. Lett. 7(4), 1365–1374 (2013)MathSciNetCrossRef Sun, H., Wen, Q., Zhang, H., Jin, Z.: A novel remote user authentication and key agreement scheme for mobile client–server environment. Appl. Math. Inf. Sci. Lett. 7(4), 1365–1374 (2013)MathSciNetCrossRef
28.
Zurück zum Zitat Hess, F.: Efficient identity-based signature schemes based on pairings. In: Nyberg, K., Heys, H. (eds.) Selected areas in cryptography, sac 2002, in lecture notes in computer science, vol. 2595, pp. 310–324. Springer, Berlin (2002) Hess, F.: Efficient identity-based signature schemes based on pairings. In: Nyberg, K., Heys, H. (eds.) Selected areas in cryptography, sac 2002, in lecture notes in computer science, vol. 2595, pp. 310–324. Springer, Berlin (2002)
29.
Zurück zum Zitat Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) Advances in cryptology—CRYPTO 2001, in lecture notes in computer science, vol. 2139, pp. 213–229. Springer, Berlin (2001)CrossRef Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) Advances in cryptology—CRYPTO 2001, in lecture notes in computer science, vol. 2139, pp. 213–229. Springer, Berlin (2001)CrossRef
30.
Zurück zum Zitat Xie, H., Kulik, L., Tanin, E.: Privacy-aware traffic monitoring. IEEE Trans. Intell. Transp. Syst. 11(1), 61–70 (2010)CrossRef Xie, H., Kulik, L., Tanin, E.: Privacy-aware traffic monitoring. IEEE Trans. Intell. Transp. Syst. 11(1), 61–70 (2010)CrossRef
31.
Zurück zum Zitat Zhang, C., Ho, P.-H., Tapolcai, J.: On batch verification with group testing for vehicular communications. Wirel. Netw. 17(8), 1851–1865 (2011)CrossRef Zhang, C., Ho, P.-H., Tapolcai, J.: On batch verification with group testing for vehicular communications. Wirel. Netw. 17(8), 1851–1865 (2011)CrossRef
32.
Zurück zum Zitat Camenisch, J., Hohenberger, S., Pedersen, M.: Batch verification of short signatures. In: Advances in cryptology-eurocrypt, in lecture notes in computer science, vol. 4515, pp. 246–263. Springer, Berlin (2007) Camenisch, J., Hohenberger, S., Pedersen, M.: Batch verification of short signatures. In: Advances in cryptology-eurocrypt, in lecture notes in computer science, vol. 4515, pp. 246–263. Springer, Berlin (2007)
33.
Zurück zum Zitat Lee, C.-C., Lai, Y.-M.: Toward a secure batch verification with group testing for VANET. Wirel. Netw. 18(6), 1441–1449 (2013)CrossRef Lee, C.-C., Lai, Y.-M.: Toward a secure batch verification with group testing for VANET. Wirel. Netw. 18(6), 1441–1449 (2013)CrossRef
34.
Zurück zum Zitat Bayat, M., Barmshoory, M., Rahimi, M., Aref, M.R.: A secure authentication scheme for VANETs with batch verification. Wirel. Netw. 21(5), 1733–1743 (2015)CrossRef Bayat, M., Barmshoory, M., Rahimi, M., Aref, M.R.: A secure authentication scheme for VANETs with batch verification. Wirel. Netw. 21(5), 1733–1743 (2015)CrossRef
35.
Zurück zum Zitat Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: Identity-based authenticated asymmetric group key agreement protocol, In: Proceedings of international computing and combinatorics conference, pp. 510–519 (2010) Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: Identity-based authenticated asymmetric group key agreement protocol, In: Proceedings of international computing and combinatorics conference, pp. 510–519 (2010)
36.
Zurück zum Zitat Zheng, Y.: Digital signcryption or how to achieve cost(signature & encryption) << cost(signature) + cost(encryption). In: Proceedings of 17th annual international cryptology conference, Santa Barbara, California, USA, August 17–21, 1997, in lecture notes in computer science, vol. 1294, Springer, Berlin, pp. 165–179 (1997) Zheng, Y.: Digital signcryption or how to achieve cost(signature & encryption) << cost(signature) + cost(encryption). In: Proceedings of 17th annual international cryptology conference, Santa Barbara, California, USA, August 17–21, 1997, in lecture notes in computer science, vol. 1294, Springer, Berlin, pp. 165–179 (1997)
37.
Zurück zum Zitat Ferrara, A., Green M., Hohenberger, S., Pedersen, M.: Practical short signature batch verification. In: Proceedings of CT-RSA, in lecture notes in computer science, vol. 5473, Springer, Berlin, pp. 309–324 (2009) Ferrara, A., Green M., Hohenberger, S., Pedersen, M.: Practical short signature batch verification. In: Proceedings of CT-RSA, in lecture notes in computer science, vol. 5473, Springer, Berlin, pp. 309–324 (2009)
38.
Zurück zum Zitat Wu, Q., Domingo-Ferrer, J., Gonzàlez-Nicolàs, Ú.: Balanced trustworthiness, safety and privacy in vehicle-to-vehicle communications. IEEE Trans. Veh. Technol. 59(2), 559–573 (2010)CrossRef Wu, Q., Domingo-Ferrer, J., Gonzàlez-Nicolàs, Ú.: Balanced trustworthiness, safety and privacy in vehicle-to-vehicle communications. IEEE Trans. Veh. Technol. 59(2), 559–573 (2010)CrossRef
39.
Zurück zum Zitat Xiong, H., Beznosov, K., Qin, Z., Ripeanu, M.: Efficient and spontaneous privacypreserving protocol for secure vehicular communication, In: Proceedings of 2010 IEEE international conference on communications (ICC), IEEE, (2010) Xiong, H., Beznosov, K., Qin, Z., Ripeanu, M.: Efficient and spontaneous privacypreserving protocol for secure vehicular communication, In: Proceedings of 2010 IEEE international conference on communications (ICC), IEEE, (2010)
40.
Zurück zum Zitat Liu, D.Y.W., Liu, J.K., Mu, Y., Susilo, W., Wong, D.: Revocable ring signature. J. Comput. Sci. Technol. 22, 78–794 (2007)MathSciNet Liu, D.Y.W., Liu, J.K., Mu, Y., Susilo, W., Wong, D.: Revocable ring signature. J. Comput. Sci. Technol. 22, 78–794 (2007)MathSciNet
41.
Zurück zum Zitat Lo, N.W., Tsai, J.L.: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Trans. Intell. Transp. Syst. 17(5), 1319–1328 (2011)CrossRef Lo, N.W., Tsai, J.L.: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Trans. Intell. Transp. Syst. 17(5), 1319–1328 (2011)CrossRef
42.
Zurück zum Zitat Mosenia, A., Jha, N.K.: A comprehensive study of security of internet-of-things. IEEE Trans. Emerg. Top. Comput. 5(4), 586–602 (2017)CrossRef Mosenia, A., Jha, N.K.: A comprehensive study of security of internet-of-things. IEEE Trans. Emerg. Top. Comput. 5(4), 586–602 (2017)CrossRef
43.
Zurück zum Zitat Chim, T.W., Yiu, S.M., Hui, L., Li, V.: SPECS: secure and privacy enhancing communications schemes for VANETs. Ad Hoc Netw. 9(2), 189–203 (2011)CrossRef Chim, T.W., Yiu, S.M., Hui, L., Li, V.: SPECS: secure and privacy enhancing communications schemes for VANETs. Ad Hoc Netw. 9(2), 189–203 (2011)CrossRef
44.
Zurück zum Zitat Hsiao, H.-C., Studer, A., Chen, C., Perrig, A., Bai, F., Bellur, B., Iyer, A.: Floodingresilient broadcast authentication for VANETs, In: Proceedings of the 17th annual international conference on mobile computing and networking (MOBICOM 2011), ACM, pp. 193–204 (2011) Hsiao, H.-C., Studer, A., Chen, C., Perrig, A., Bai, F., Bellur, B., Iyer, A.: Floodingresilient broadcast authentication for VANETs, In: Proceedings of the 17th annual international conference on mobile computing and networking (MOBICOM 2011), ACM, pp. 193–204 (2011)
45.
Zurück zum Zitat Vijayakumar, P., Azees, M., Kannan, A., Lazarus, J.D.: Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 17(4), 1015–1028 (2016)CrossRef Vijayakumar, P., Azees, M., Kannan, A., Lazarus, J.D.: Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 17(4), 1015–1028 (2016)CrossRef
46.
Zurück zum Zitat Shao, J., Lin, X., Lu, R., Zuo, C.: A threshold anonymous authentication protocol for VANETs. IEEE Trans. Veh. Technol. 65(3), 1711–1720 (2016)CrossRef Shao, J., Lin, X., Lu, R., Zuo, C.: A threshold anonymous authentication protocol for VANETs. IEEE Trans. Veh. Technol. 65(3), 1711–1720 (2016)CrossRef
47.
Zurück zum Zitat Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., Hu, C.: Distributed aggregate privacy-preserving authentication in VANETs. IEEE Trans. Intell. Transp. Syst. 18(3), 516–526 (2017)CrossRef Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., Hu, C.: Distributed aggregate privacy-preserving authentication in VANETs. IEEE Trans. Intell. Transp. Syst. 18(3), 516–526 (2017)CrossRef
48.
Zurück zum Zitat Zhang, L., Hu, C., Wu, Q., Domingo-Ferrer, J., Qin, B.: Privacy preserving vehicular communication authentication with hierarchical aggregation and fast response. IEEE Trans. Comput. 65(8), 2562–2574 (2016)MathSciNetCrossRef Zhang, L., Hu, C., Wu, Q., Domingo-Ferrer, J., Qin, B.: Privacy preserving vehicular communication authentication with hierarchical aggregation and fast response. IEEE Trans. Comput. 65(8), 2562–2574 (2016)MathSciNetCrossRef
49.
Zurück zum Zitat Lai, C., Zhou, H., Cheng, N., Shen, X.S.: Secure group communications in vehicular networks: a software-defined network-enabled architecture and solution. IEEE Veh. Technol. Mag. 12(4), 40–49 (2017)CrossRef Lai, C., Zhou, H., Cheng, N., Shen, X.S.: Secure group communications in vehicular networks: a software-defined network-enabled architecture and solution. IEEE Veh. Technol. Mag. 12(4), 40–49 (2017)CrossRef
50.
Zurück zum Zitat Wasef, A., Shen, X.: MAAC: message authentication acceleration protocol for vehicular ad hoc networks, In: Proceedings of IEEE GlobeCom, IEEE (2009) Wasef, A., Shen, X.: MAAC: message authentication acceleration protocol for vehicular ad hoc networks, In: Proceedings of IEEE GlobeCom, IEEE (2009)
51.
Zurück zum Zitat Wasef, A., Shen, X.: EMAP: expedite message authentication protocol for vehicular ad hoc networks. IEEE Trans. Mob. Comput. 12(1), 78–89 (2013)CrossRef Wasef, A., Shen, X.: EMAP: expedite message authentication protocol for vehicular ad hoc networks. IEEE Trans. Mob. Comput. 12(1), 78–89 (2013)CrossRef
52.
Zurück zum Zitat Cui, J., Zhang, J., Zhong, H., Xu, Y.: SPACF: a secure privacy-preserving authentication scheme for VANET with cuckoo filter. IEEE Trans. Veh. Technol. 66(11), 10283–10295 (2017)CrossRef Cui, J., Zhang, J., Zhong, H., Xu, Y.: SPACF: a secure privacy-preserving authentication scheme for VANET with cuckoo filter. IEEE Trans. Veh. Technol. 66(11), 10283–10295 (2017)CrossRef
53.
Zurück zum Zitat Chiou, S., Ying, Z., Liu, J.: Improvement of a privacy authentication scheme based on cloud for medical environment. J. Med. Syst. 40, 101 (2016)CrossRef Chiou, S., Ying, Z., Liu, J.: Improvement of a privacy authentication scheme based on cloud for medical environment. J. Med. Syst. 40, 101 (2016)CrossRef
57.
Zurück zum Zitat Chen, T.H., Yeh, H.L., Shih, W.K.: An advanced ECC dynamic ID based remote mutual authentication scheme for cloud computing. In: Proceedings of the 5th FTRA international conference on multimedia and ubiquitous engineering. pp. 155–159 (2011) Chen, T.H., Yeh, H.L., Shih, W.K.: An advanced ECC dynamic ID based remote mutual authentication scheme for cloud computing. In: Proceedings of the 5th FTRA international conference on multimedia and ubiquitous engineering. pp. 155–159 (2011)
58.
Zurück zum Zitat Biswas, S., Misic, J., Misic, V.: ID-based safety message authentication for security and trust in vehicular networks, In: Proceedings of 31st ICDCS workshops, IEEE, Minneapolis, pp. 323–331 (2011) Biswas, S., Misic, J., Misic, V.: ID-based safety message authentication for security and trust in vehicular networks, In: Proceedings of 31st ICDCS workshops, IEEE, Minneapolis, pp. 323–331 (2011)
67.
Zurück zum Zitat Mohit, P., Amin, R., Karati, A., Biswas, G.P., Khan, M.K.: A standard mutual authentication protocol for cloud computing-based health care system. J. Med. Syst. 41, 50 (2017)CrossRef Mohit, P., Amin, R., Karati, A., Biswas, G.P., Khan, M.K.: A standard mutual authentication protocol for cloud computing-based health care system. J. Med. Syst. 41, 50 (2017)CrossRef
69.
Zurück zum Zitat He, D., Chan, S., Guizani, M.: Handover authentication for mobile networks: security and efficiency aspects. IEEE Netw. 29, 96–103 (2015)CrossRef He, D., Chan, S., Guizani, M.: Handover authentication for mobile networks: security and efficiency aspects. IEEE Netw. 29, 96–103 (2015)CrossRef
70.
Zurück zum Zitat Kumar, A., Om, H.: Handover authentication scheme for device-to-device outband communication in 5G-WLAN next generation heterogeneous networks. Arab. J. Sci. Eng. 43, 7961–7977 (2018)CrossRef Kumar, A., Om, H.: Handover authentication scheme for device-to-device outband communication in 5G-WLAN next generation heterogeneous networks. Arab. J. Sci. Eng. 43, 7961–7977 (2018)CrossRef
Metadaten
Titel
A secure authentication technique for connecting different IoT devices in the smart city infrastructure
verfasst von
Rohit Sharma
Rajeev Arya
Publikationsdatum
02.11.2021
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe 4/2022
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-021-03444-8

Weitere Artikel der Ausgabe 4/2022

Cluster Computing 4/2022 Zur Ausgabe

Premium Partner