A CPK-Based Identity Authentication Scheme for IoT
نویسندگان
چکیده
As the power Internet of Things (IoT) enters security construction stage, massive use perception layer devices urgently requires an identity authentication scheme that considers both and practicality. The existing public key infrastructure (PKI)-based is currently difficult to apply in many terminals IoT. Its distribution management costs are high, which hinders development IoT construction. Combined Public Key (CPK) technology uses a small number seeds generate unlimited keys. It very suitable for Things. In this paper, we propose novel combines physical unclonable function (PUF) with improved CPK achieve mutual between servers. proposed does not require third-party improves Moreover, reduces resource consumption devices. algorithm solves collision problem, third party only needs save private matrix. Experimental results show amount storage resources occupied our small. more
منابع مشابه
Some observations on a lightweight authentication scheme with capabilities of anonymity and trust in Internet of Things (IoT)
Over the last years, the concept of Internet of Things (IoT) leads to a revolution in the communications of humans and things. Security and efficiency could be the main challenges of that communication. On the other hand, authenticity and confidentiality are two important goals to provide desired security in an information system, including IoT-based applications. An Authentication an...
متن کاملIdentity Authentication Scheme Expansion Based on Speaker Verification
Although in theory, the speaker verification accuracy will not decrease with the number of users increasing, in fact, is not the case. In view of this situation, this paper expands the identity authentication scheme based on speaker recognition which is safe but deficient. After expansion, the identity authentication scheme based on speaker verification is more effective and practical.
متن کاملA Novel Dynamic Identity based Authentication Scheme for Multi- Server Environment using Smart Cards
Remote user authentication scheme with key agreement is a very practical mechanism to verify a remote user and then provide secure communication. Furthermore, many network environments have been becoming multi-server based due to the rapid growth of computer networks. Therefore, more and more researches have been focused on proposing smart card based remote authentication scheme with session ke...
متن کاملA Key Agreement Scheme for Identity Authentication Based on Multiple Security Factors
By the study of Li-Hwang's three-factor authenticated key agreement protocol, we find there exists multiple attack in it. Therefore, this paper proposes a remote user authentication protocol based on ECC to improve the protocol. The new protocol only needs one point multiplication of elliptic curve cryptography in login and authentication protocol, so its computation efficiency is high. The pro...
متن کاملA Secure and Efficient Dynamic Identity based Authentication Scheme for Multi-Server Environment using Smart Cards
Recently, more and more researches have been focused on proposing dynamic identity based remote authentication scheme for multi-server environment. In 2011, Lee, Lin and Chang proposed an improved scheme to remedy the weaknesses of Hsiang-Shih's scheme. However, we observe that Lee-Lin-Chang's scheme is still vulnerable to stolen smart card attack and malicious server attack. Besides, the passw...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer systems science and engineering
سال: 2022
ISSN: ['0267-6192']
DOI: https://doi.org/10.32604/csse.2022.017657