A Blockchain-Based Authentication Protocol for WLAN Mesh Security Access
نویسندگان
چکیده
منابع مشابه
A TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملA Novel Authentication Protocol for Wireless Access Security
This paper proposes a novel authentication protocol for wireless access security. Current symmetric key based authentication schemes are vulnerable to a variety of attacks such as the denialof-service attacks and the domino effect attacks, while public key based authentication schemes are costly. This paper designed a novel elliptic curve based authentication scheme that can avoid the certifica...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملA Security Protocol for Multi-User Authentication
Abstract: In this note we propose an encryption communication protocol which also provides database security. For the encryption of the data communication we use a transformation similar to the Cubic Public-key transformation [1]. This method represents a many-to-one mapping which increases the complexity for any brute force attack. Some interesting properties of the transformation are also inc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers, Materials & Continua
سال: 2019
ISSN: 1546-2226
DOI: 10.32604/cmc.2019.03863