閱讀全文 | |
篇名 |
WSN Integrated Authentication Schemes Based on Internet of Things
|
---|---|
並列篇名 | WSN Integrated Authentication Schemes Based on Internet of Things |
作者 | Tsung-Hung Lin、Cheng-Chi Lee、Chia-Hao Chang |
英文摘要 | The leader of the new generation of technology, namely the Internet of Things (IoT), is now already an indispensable part of many people’s lives. In this research, we have analyzed the main communication models of IoT in terms of functional conformity and classified those models into two kinds. Then, for each of the two kinds, we have developed a new generalized model that is applicable in practically every possible case. Our first new model is to be applied in most common network environments where users directly connect to the authentication server, whereas the second new model is most applicable when users connect to some specified devices instead of a server. Besides the couple of new communication models we have just developed, in this paper we shall also present some integrated security authentication schemes that we have designed. Through some thorough security analyses, we have proven that our new schemes can resist a collection of attacks including the replay attack, privileged insider attack, stolen verifier attack, stolen smart card and smart card breach attack, impersonation, as well as the offline password guessing attack. In addition to the high security level, our new schemes also provide user anonymity with the communication efficiency unaffected by the security protection. On top of everything, our major concern and contribution is for every member of the worldwide IoT user community to enjoy the conveniences the industry 4.0 technologies bring without loss of privacy and personal interests. |
起訖頁 | 1043-1053 |
關鍵詞 | Internet of things、Smart card、Key agreement、Authentication、WSN |
刊名 | 網際網路技術學刊 |
期數 | 201807 (19:4期) |
出版單位 | 台灣學術網路管理委員會 |
DOI |
|
QR Code | |
該期刊 上一篇
| Granularity-based Uncertain QoS Partitioning for Web Service Reliability |
該期刊 下一篇
| Further Analysis on Smart TV Forensics |