A CPK-Based Identity Authentication Scheme for IoT

نویسندگان

چکیده

As the power Internet of Things (IoT) enters security construction stage, massive use perception layer devices urgently requires an identity authentication scheme that considers both and practicality. The existing public key infrastructure (PKI)-based is currently difficult to apply in many terminals IoT. Its distribution management costs are high, which hinders development IoT construction. Combined Public Key (CPK) technology uses a small number seeds generate unlimited keys. It very suitable for Things. In this paper, we propose novel combines physical unclonable function (PUF) with improved CPK achieve mutual between servers. proposed does not require third-party improves Moreover, reduces resource consumption devices. algorithm solves collision problem, third party only needs save private matrix. Experimental results show amount storage resources occupied our small. more

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Some observations on a lightweight authentication scheme with capabilities of anonymity and trust in Internet of Things (IoT)

Over the last years‎, ‎the concept of Internet of Things (IoT) leads to a revolution in the communications of humans and things. ‎Security and efficiency could be the main challenges of that communication‎‎. ‎‎On the other hand, ‎ authenticity and confidentiality are two important goals to provide desired security in an information system‎, including IoT-based applications. An Authentication an...

متن کامل

Identity Authentication Scheme Expansion Based on Speaker Verification

Although in theory, the speaker verification accuracy will not decrease with the number of users increasing, in fact, is not the case. In view of this situation, this paper expands the identity authentication scheme based on speaker recognition which is safe but deficient. After expansion, the identity authentication scheme based on speaker verification is more effective and practical.

متن کامل

A Novel Dynamic Identity based Authentication Scheme for Multi- Server Environment using Smart Cards

Remote user authentication scheme with key agreement is a very practical mechanism to verify a remote user and then provide secure communication. Furthermore, many network environments have been becoming multi-server based due to the rapid growth of computer networks. Therefore, more and more researches have been focused on proposing smart card based remote authentication scheme with session ke...

متن کامل

A Key Agreement Scheme for Identity Authentication Based on Multiple Security Factors

By the study of Li-Hwang's three-factor authenticated key agreement protocol, we find there exists multiple attack in it. Therefore, this paper proposes a remote user authentication protocol based on ECC to improve the protocol. The new protocol only needs one point multiplication of elliptic curve cryptography in login and authentication protocol, so its computation efficiency is high. The pro...

متن کامل

A Secure and Efficient Dynamic Identity based Authentication Scheme for Multi-Server Environment using Smart Cards

Recently, more and more researches have been focused on proposing dynamic identity based remote authentication scheme for multi-server environment. In 2011, Lee, Lin and Chang proposed an improved scheme to remedy the weaknesses of Hsiang-Shih's scheme. However, we observe that Lee-Lin-Chang's scheme is still vulnerable to stolen smart card attack and malicious server attack. Besides, the passw...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer systems science and engineering

سال: 2022

ISSN: ['0267-6192']

DOI: https://doi.org/10.32604/csse.2022.017657