References
- Afreen, R., & Mehrotra, S. C. (2011). A review on elliptic curve cryptography for embedded systems. J Comput Sci Inf Technol, 3(3), 84–103. https://doi.org/https://doi.org/10.5121/ijcsit.2011.3307
- Alcaide, A., Palomar, E., Montero-Castillo, J., & Ribagorda, A. (2013). Anonymous authentication for privacy-preserving IoT target-driven applications. Computers & Security, 37, 111–123. https://doi.org/https://doi.org/10.1016/j.cose.2013.05.007
- Amin, R., Kunal, S., Saha, A., Das, D., & Alamri., A. (2020b). CFSec: Password based secure communication protocol in cloud-fog environment. Journal of Parallel and Distributed Computing, 140, 52–62. https://doi.org/https://doi.org/10.1016/j.jpdc.2020.02.005
- Amin, R., Lohani, P., Ekka, M., Chourasia, S., & Vollala, S. (2020a). An enhanced anonymity resilience security protocol for vehicular ad-hoc network with Scyther simulation. Computers & Electrical Engineering, 82, 1–18. https://doi.org/https://doi.org/10.1016/j.compeleceng.2020.106554
- Anandhi, S., Anitha, R., & Sureshkumar, V. (2018). An automatic RFID reader-to-reader delegation protocol for SCM in cloud computing environment. The Journal of Supercomputing, 74(7), 3148–3167. https://doi.org/https://doi.org/10.1007/s11227-018-2365-y
- Anandhi, S., Anitha, R., & Sureshkumar, V. (2020). An authentication protocol to track an object with multiple rfid tags using cloud computing environment. Wireless Personal Communications, 113(4), 2339–2361. https://doi.org/https://doi.org/10.1007/s11277-020-07330-1
- Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. . Computer Networks, 54(15), 2787–2805. https://doi.org/https://doi.org/10.1016/j.comnet.2010.05.010
- Bhubaneswari, S., & Ananth, N. V. (2018). Enhanced mutual authentication scheme for cloud of things. Int J Pure Appl Math, 119(15), 1571–1583. https://acadpubl.eu/hub/2018-119-15/4/769.pdf
- Botta, A., Donato, W. D., Persico, V., & Pescape, A. (2016). Integration of cloud computing and Internet of things: A survey. Future Generation Computer Systems, 56, 684–700. https://doi.org/https://doi.org/10.1016/j.future.2015.09.021
- Challa, S., Wazid, M., Das, A. K., Kumar, N., Reddy, A. G., Yoon, E.-J., & Yoo, K.-Y. (2017). Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access., 5, 3028–3043. https://doi.org/https://doi.org/10.1109/ACCESS.2017.2676119
- Dwivedi, S., . K., Amin, R., & Vollala, S. (2020). Blockchain based secured information sharing protocol in supply chain management system with key distribution mechanism. Journal of Information Security and Applications, 54, 1–15. https://doi.org/https://doi.org/10.1016/j.jisa.2020.102554
- Hankerson, D., Menezes, A., & Vanstone, S. (2004). Guide to Elliptic Curve Cryptography. Springer-Verlag.
- Kalra, S., & Sood, S. K. (2015). Secure authentication scheme for IOT and cloud servers. Pervasive and Mobile Computing, 24, 210–223. https://doi.org/https://doi.org/10.1016/j.pmcj.2015.08.001
- Khatwani, C., & Roy, S. (2015). Security analysis of ECC based authentication protocols. In: Proceedings of IEEE international conference on computational intelligence and communication networks, 1167–1172. Jabalpur, India.
- Kumari, S., Karuppiah, M., Das, A. K., Li, X., Wu, F., & Kumar, N. A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. (2018). The Journal of Supercomputing, 74(12), 6428–6453. Das, & A. K. et al. https://doi.org/https://doi.org/10.1007/s11227-017-2048-0
- Liao, Y.-P., & Hsiao, C.-M. (2014). A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Networks, 18, 133–146. https://doi.org/https://doi.org/10.1016/j.adhoc.2013.02.004. Hsiao, & C. M.
- Lin, X.-J., Sun, L., & Qu, H. (2015). Insecurity of an anonymous authentication for privacy-preserving IoT target-driven applications. Computers & Security, 48, 142–149. https://doi.org/https://doi.org/10.1016/j.cose.2014.08.002
- Moosavi, S. R., Nigussie, E., Virtanen, S., & Isoaho, J. (2014). An Elliptic Curve-based Mutual Authentication Scheme for RFID Implant Systems. Procedia Computer Science, 32, 198–206. https://doi.org/https://doi.org/10.1016/j.procs.2014.05.415
- Panda, P. K., & Chattopadhyay, S. (2020). An Improved Authentication and Security Scheme for LTE/LTE-A Networks. Journal of Ambient Intelligence and Humanized Computing, 11(5), 2163–2185. https://doi.org/https://doi.org/10.1007/s12652-019-01248-8
- Peeters, R., & Hermans, J. (2013). Attack on Liao and Hsiao’s Secure ECC based RFID authentication scheme integrated with ID-verifier transfer protocol. Cryptology ePrint Archive. Report 2013/399. eprint.iacr.org/2013/399.pdf
- Persson, P., & Angelsmark, O. (2015). Calvin – Merging Cloud and IoT. Procedia Computer Science, 52, 210–217. https://doi.org/https://doi.org/10.1016/j.procs.2015.05.059
- Sascha, M., & Sebastian, W. (2008). Secure communication in microcomputer bus systems for embedded devices. J. Syst. Archit., 54(11), 1065–1076. https://doi.org/https://doi.org/10.1016/j.sysarc.2008.04.003
- Suganthi, S. D., Anitha, R., Sureshkumar, V., Harish, S., & Agalya, S. (2020). End to end light weight mutual authentication scheme in IoT-based healthcare environment. . Journal of Reliable Intelligent Environments, 6(1), 3–13. https://doi.org/https://doi.org/10.1007/s40860-019-00079-w
- Sureshkumar, V., Amin, R., Obaidat, M. S., & Karthikeyan, I. (2020). An enhanced mutual authentication and key establishment protocol for TMIS using chaotic map. Journal of Information Security and Applications, 53, 1–12. https://doi.org/https://doi.org/10.1016/j.jisa.2020.102539
- Sureshkumar, V., Anandhi, S., Madhumathi, R., & Selvarajan, N. (2019). Light weight authentication and key establishment protocol for smart vehicles communication in smart city. Commun Comput Inf Sci, 1122, 349–362. https://doi.org/https://doi.org/10.1007/978-981-15-1301-5_28
- Vigano, L. (2006). Automated security protocol analysis with the AVISPA Tool. Electronic Notes in Theoretical Computer Science, 155, 61–86. https://doi.org/https://doi.org/10.1016/j.entcs.2005.11.052