Continuous Entity Authentication in the Internet of Things Scenario
نویسندگان
چکیده
In the context of Internet Things (IoT), proliferation identity spoofing threats has led to need for constant entity verification devices. Recently, a formal framework been proposed study resistance impersonation attacks One-Message Unilateral Entity Authentication (OM-UEA) schemes, in which prover continuously authenticates itself through use sequence authentication messages. Given limited computing power parties (particularly prover) and often bandwidth channel, IoT scenario it is desirable design unilateral schemes that require single message per session light computations. this paper, we first show OM-UEA can be implemented digital signatures weak form unforgeability sufficient achieve security against active adversaries. We then apply signature scheme by Yang et al. ASIACCS 2020 our framework, resulting an requires minimal computational effort low storage requirements prover. Inspired last construction, propose based on hardness discrete logarithm problem, further improves performance Our findings offer feasible options implementing secure continuous applications.
منابع مشابه
A Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملRole and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns
The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...
متن کاملAuthentication and En-route Data Filtering for Wireless Sensor Networks in the Internet of Things Scenario
To become an indispensable part of the Internet of Things (IoT), wireless sensor networks (WSNs) have to be integrated into the Internet. Under such circumstances, any IP-enabled node in the Internet shall be able to directly communicate with any sensor node in a WSN. Then, multiple sensor nodes can be used to monitor an event and jointly generate a report to be sent to one or more Internet nod...
متن کاملAuthentication Systems in Internet of Things
-----------------------------------------------------------------------ABSTRACT---------------------------------------------------------This paper analyzes the various authentication systems implemented for enhanced security and private reposition of an individual’s login credentials. The first part of the paper describes the multi-factor authentication (MFA) systems, which, though not applicab...
متن کاملimprovement of Location-based Algorithm in the Internet of Things
Location Based Services (LBS) has become an important field of research with the rapid development of Internet-based Information Technology (IOT) technology and everywhere we use smartphones and social networks in our everyday lives. Although users can enjoy the flexibility, facility, facility and location-based services (LBS) with the Internet of Things, they may lose their privacy. An untrust...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied sciences
سال: 2023
ISSN: ['2076-3417']
DOI: https://doi.org/10.3390/app13105945