scholarly journals Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle

Sensors ◽  
2015 ◽  
Vol 16 (1) ◽  
pp. 20 ◽  
Author(s):  
Namje Park ◽  
Namhi Kang
Electronics ◽  
2020 ◽  
Vol 9 (4) ◽  
pp. 634 ◽  
Author(s):  
Xudong Jia ◽  
Ning Hu ◽  
Shen Su ◽  
Shi Yin ◽  
Yan Zhao ◽  
...  

The incredible development of Internet of things technology promotes the integration of application systems, which enable people to enjoy the convenience of multiple application services through a single intelligent device or terminal. In order to implement value exchange and information sharing between different applications, cross-domain access is inevitable. In order to prevent illegal access, identity authentication is necessary before the terminal accesses the service. Because of the need to introduce a trusted third party, the traditional centralized authentication model not only destroys the autonomy and flexibility of the application system, but also causes issues such as single point of failure and hidden dangers of unilateral control. This paper proposes an identity-based cross-domain authentication scheme for the Internet of Things. This scheme uses the Blockchain as a decentralized trust anchor instead of the traditional certificate of authority, and uses the identity-based self-authentication algorithm to replace the traditional PKI authentication algorithm. The scheme proposed in this paper implements a decentralized authentication model, which can guarantee the autonomy and initiative of the security domain.


2019 ◽  
Vol 92 ◽  
pp. 1028-1039 ◽  
Author(s):  
Mian Ahmad Jan ◽  
Fazlullah Khan ◽  
Muhammad Alam ◽  
Muhammad Usman

2020 ◽  
Vol 9 ◽  
pp. 100160 ◽  
Author(s):  
Bacem Mbarek ◽  
Mouzhi Ge ◽  
Tomáš Pitner

Electronics ◽  
2020 ◽  
Vol 9 (12) ◽  
pp. 2167
Author(s):  
Sai Ji ◽  
Shuai Liu ◽  
Chen Wang ◽  
Rongxin Qi ◽  
Jian Shen

In traditional transportation, each driver usually relies on their experience to determine an appropriate route, which may shorten the driving time and transport cost. However, this may also lead to a waste of time in traffic jams or due to other problems. In recent years, by introducing Internet of Things technology into the transportation system, traffic condition data can be collected and analyzed in real-time, which makes it easier for drivers to choose appropriate routes. However, the transmitted data may be intercepted or falsified, especially in untrusted public communication channels. Some schemes have been proposed to protect personal data, while they are vulnerable to some known attacks. Therefore, we propose a mutual authentication scheme for session key agreement and information encryption before transmitting personal data. This scheme can correctly identify vehicles and information. The Burrows–Abadi–Needham logic proof and our security discussion demonstrate that this authentication scheme can resist the various known attacks, including de-synchronization, the replay attack and the reader lost attack, which is solved for the first time in this field. Compared with some typical schemes, the performance analysis shows that this new scheme realizes a balance between security and computing costs.


Author(s):  
Jiangfeng Sun ◽  
Fazlullah Khan ◽  
Junxia Li ◽  
Mohammad Dahman Alshehri ◽  
Ryan Alturki ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document