A dynamic ID-based authentication scheme

@article{Nguyen2010ADI,
  title={A dynamic ID-based authentication scheme},
  author={Tien Dung Nguyen and Aymen Abdullah Alsaffar and Eui-nam Huh},
  journal={The 6th International Conference on Networked Computing and Advanced Information Management},
  year={2010},
  pages={248-253}
}
M2M (machine to machine) applications involving intelligence to ubiquitous environment have been in existence for the past many years. However, its provisioning using mobile technologies raises a new security challenge. Security services such as authentication and key establishment are critical in M2M, especially for healthcare systems. We proposed a simple architectureM2M service to apply any hospital which considers mobility of doctors and patients. An efficient security scheme with dynamic… CONTINUE READING
Highly Cited
This paper has 179 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 17 extracted citations

A distributed authentication and key exchange approach for secure M2M communications

2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT) • 2017
View 1 Excerpt

Authentication Techniques for the Internet of Things: A Survey

2016 Cybersecurity and Cyberforensics Conference (CCC) • 2016
View 3 Excerpts

Elliptic curve cryptography based key management for the M2M local cloud platform

2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS) • 2016

179 Citations

050100'14'15'16'17'18'19
Citations per Year
Semantic Scholar estimates that this publication has 179 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 15 references

Mobile sink using multiple channels to defend against wormhole attacks in wireless sensor networks

2009 IEEE 28th International Performance Computing and Communications Conference • 2009

Accomplishment of the key setting up: The flexible approach

G. Lee, E. Huh
The 2008 World Congress in Computer Science, • 2008

huh, "A reliable 2-mode authentication framework for Ubiquitous sensor network

T. T. Huyen, Eui-Nam
Journal of Korean Society for Internet Information, • 2008

A hexagon-based key predistribution scheme in sensor networks

2006 International Conference on Parallel Processing Workshops (ICPPW'06) • 2006

PIKE: peer intermediaries for key establishment in sensor networks

Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies. • 2005

Similar Papers

Loading similar papers…