Design and Analysis of a Provable Secure Two-Factor Authentication Protocol for Internet of Things
نویسندگان
چکیده
Because sensor nodes are deployed in public areas, these sensors easy to capture by adversaries. Once a is stolen, the sensitive information stored it likely be exposed. Accordingly, designing secure authentication protocol should consider this issue. Sadri et al. recently proposed two-factor with anonymity for wireless networks. Unfortunately, we found that their had design flaw user and phase. Besides, can not resist stolen smart card attacks, impersonation attacks. In addition, does provide perfect forward security. This paper proposes provably overcome weaknesses flaws. By comparing security performance of other related protocols, find our work has reasonable computation overhead better
منابع مشابه
A Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملa comparative analysis of the marginal microleakages of two pit and fissure sealans, conseal-f and conseal clear
چکیده ندارد.
15 صفحه اولfactor influencing the adoption of internet banking
دوره مشترک کارشناسی ارشد بازاریابی و تجارت الکترونیک دانشگاه تربیت مدرس_ دانشگاه تکنولوژی lule? چکیده پایان نامه عوامل موثر بر پذیرش اینترنت بانک توسط مشتریان پیشرفت فناوری اطلاعات و ارتباطات و به طور خاص رشد اینترنت جهت تراکنش های معاملات بازرگانی، تاثیر بسیار عمیقی در صنعت بانکداری داشته است.این در حالی ست که نفوذ بانکداری اینترنتی در کشورهای در حال توسعه بسیار کندتر از نفوذ آن ...
15 صفحه اولinvestigating the feasibility of a proposed model for geometric design of deployable arch structures
deployable scissor type structures are composed of the so-called scissor-like elements (sles), which are connected to each other at an intermediate point through a pivotal connection and allow them to be folded into a compact bundle for storage or transport. several sles are connected to each other in order to form units with regular polygonal plan views. the sides and radii of the polygons are...
Secure Multicast with Source Authentication for the Internet of Things
English) The Internet of Things is a rapidly evolving eld of high-end technology and research. Its security is vital to the reliability and safety of the future everyday communications. The DTLS protocol is a default protocol to assure security for unicast communication. A DTLS record layer extension for multicast in constrained environments is being designed to assure security for multicast. H...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2022
ISSN: ['1939-0122', '1939-0114']
DOI: https://doi.org/10.1155/2022/4468301