Client-Server Based Authentication Against MITM Attack via Fast Communication for IIoT Devices

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Advanced Client/Server Authentication in TLS

Many business transactions on the Internet occur between strangers, that is, between entities with no prior relationship and no common security domain. Traditional security approaches based on identity or capabilities do not solve the problem of establishing trust between strangers. New approaches to trust establishment are required that are secure, scalable, and portable. One new approach to m...

متن کامل

Client-Server Multi-Factor Authentication Using Pairings

What would be the ideal attributes of a client-server authentication scheme? One might like an identity based scheme not requiring PKI, plus support for multi-factor authentication based on a token, a PIN number, and optionally a biometric. The former might hold a high-entropy secret, and the latter may be represented as relatively lowentropy parameters. However it would be preferred if the tok...

متن کامل

Framework for Authentication and Access Control of Client-Server Group Communication Systems

Group communication systems are building tools for distributed and collaborative applications that often run in an insecure environment. Although necessary, basic security services such as data secrecy and data integrity are not sufficient for a secure group communication system. Entity authentication and access control services are needed to provide the application with a policy enforcement me...

متن کامل

Authentication and Virus Detection Enhancement for Client and Server Applications

Security issues are a core part of distributed computing systems, and are part of everyday life since they are used in web servers, email, mobile phones, bank transactions etc. Applications which send an unencrypted password over a communication channel are extremely vulnerable. In addition, the only techniques that have been applied to most systems are security properties such as secrecy and a...

متن کامل

Secured Client Server Communication in Cloud Environment

It’s smarter to rent than to buy such kind of service is provided by cloud computing. It is a model that is used for delivering resources that can be either Software or Hardware. Its means getting resources through network and more over that charges based only on the amount of computing resources used. Cloud service such as infrastructure as a service is caught for a security issue because by n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Balkan Journal of Electrical and Computer Engineering

سال: 2018

ISSN: 2147-284X

DOI: 10.17694/bajece.419546