Client-Server Based Authentication Against MITM Attack via Fast Communication for IIoT Devices
نویسندگان
چکیده
منابع مشابه
Advanced Client/Server Authentication in TLS
Many business transactions on the Internet occur between strangers, that is, between entities with no prior relationship and no common security domain. Traditional security approaches based on identity or capabilities do not solve the problem of establishing trust between strangers. New approaches to trust establishment are required that are secure, scalable, and portable. One new approach to m...
متن کاملClient-Server Multi-Factor Authentication Using Pairings
What would be the ideal attributes of a client-server authentication scheme? One might like an identity based scheme not requiring PKI, plus support for multi-factor authentication based on a token, a PIN number, and optionally a biometric. The former might hold a high-entropy secret, and the latter may be represented as relatively lowentropy parameters. However it would be preferred if the tok...
متن کاملFramework for Authentication and Access Control of Client-Server Group Communication Systems
Group communication systems are building tools for distributed and collaborative applications that often run in an insecure environment. Although necessary, basic security services such as data secrecy and data integrity are not sufficient for a secure group communication system. Entity authentication and access control services are needed to provide the application with a policy enforcement me...
متن کاملAuthentication and Virus Detection Enhancement for Client and Server Applications
Security issues are a core part of distributed computing systems, and are part of everyday life since they are used in web servers, email, mobile phones, bank transactions etc. Applications which send an unencrypted password over a communication channel are extremely vulnerable. In addition, the only techniques that have been applied to most systems are security properties such as secrecy and a...
متن کاملSecured Client Server Communication in Cloud Environment
It’s smarter to rent than to buy such kind of service is provided by cloud computing. It is a model that is used for delivering resources that can be either Software or Hardware. Its means getting resources through network and more over that charges based only on the amount of computing resources used. Cloud service such as infrastructure as a service is caught for a security issue because by n...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Balkan Journal of Electrical and Computer Engineering
سال: 2018
ISSN: 2147-284X
DOI: 10.17694/bajece.419546