Continuous Entity Authentication in the Internet of Things Scenario

نویسندگان

چکیده

In the context of Internet Things (IoT), proliferation identity spoofing threats has led to need for constant entity verification devices. Recently, a formal framework been proposed study resistance impersonation attacks One-Message Unilateral Entity Authentication (OM-UEA) schemes, in which prover continuously authenticates itself through use sequence authentication messages. Given limited computing power parties (particularly prover) and often bandwidth channel, IoT scenario it is desirable design unilateral schemes that require single message per session light computations. this paper, we first show OM-UEA can be implemented digital signatures weak form unforgeability sufficient achieve security against active adversaries. We then apply signature scheme by Yang et al. ASIACCS 2020 our framework, resulting an requires minimal computational effort low storage requirements prover. Inspired last construction, propose based on hardness discrete logarithm problem, further improves performance Our findings offer feasible options implementing secure continuous applications.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns

The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...

متن کامل

Authentication and En-route Data Filtering for Wireless Sensor Networks in the Internet of Things Scenario

To become an indispensable part of the Internet of Things (IoT), wireless sensor networks (WSNs) have to be integrated into the Internet. Under such circumstances, any IP-enabled node in the Internet shall be able to directly communicate with any sensor node in a WSN. Then, multiple sensor nodes can be used to monitor an event and jointly generate a report to be sent to one or more Internet nod...

متن کامل

Authentication Systems in Internet of Things

-----------------------------------------------------------------------ABSTRACT---------------------------------------------------------This paper analyzes the various authentication systems implemented for enhanced security and private reposition of an individual’s login credentials. The first part of the paper describes the multi-factor authentication (MFA) systems, which, though not applicab...

متن کامل

improvement of Location-based Algorithm in the Internet of Things

Location Based Services (LBS) has become an important field of research with the rapid development of Internet-based Information Technology (IOT) technology and everywhere we use smartphones and social networks in our everyday lives. Although users can enjoy the flexibility, facility, facility and location-based services (LBS) with the Internet of Things, they may lose their privacy. An untrust...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Applied sciences

سال: 2023

ISSN: ['2076-3417']

DOI: https://doi.org/10.3390/app13105945