CAKE: Compatible Authentication and Key Exchange Protocol for a Smart City in 5G Networks
نویسندگان
چکیده
In a smart city, there are different types of entities, such as nature persons, IoT devices, and service providers, which have computational limitations storage limitations. Unfortunately, all the existing authentication key exchange (AKE) protocols designed for either client–server or client–client authentication, including ones cities. this paper, we present idea compatible (CAKE) protocol provides cross-species authentication. We propose first CAKE city that any two valid entities can authenticate with each other create secure session without help third party, while is also no password table public issuing problem. The entity be natural person having biometrics, an device embedded physical unclonable function (PUF), provider. Moreover, extend to anonymous (ACAKE) protocol, persons option protect their privacy. addition, both proposed ACAKE deal revocation define framework security model protocols. Under model, formally prove under elliptic curve Diffie–Hellman (ECCDH) problem, decisional bilinear (DBDH) hash assumptions. Comparisons related conducted demonstrate benefits our Performance analysis experience results show practical in city.
منابع مشابه
A New Authentication and Key Exchange Protocol for Session Initiation Protocol Using Smart Card
In today′s communications over Internet Protocol (IP), Session Initiation Protocol (SIP) is using establish, modify and terminate the sessions multimedia among participants. Authentication is the most security service required for SIP. Authentication HTTP Digest is the original authentication protocol proposed for SIP. However, this protocol is demonstrated insecure against different attacks. T...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملA Comparison Study on Key Exchange-Authentication protocol
A key exchange protocol enables two parties to share a common key for encrypting a large amount of data. Authentication is an essential requirement prior to the key exchange process in order to prevent man-in-the-middle attack. It is important to understand the capabilities and performance of the existing key exchange protocols before employing the protocols in our applications. In this paper, ...
متن کاملSecurity Analysis of WAPI Authentication and Key Exchange Protocol
Protocol ∗ Liufei Wu1,2 Yuqing Zhang2 FengjiaoWang2 1Communication Engineering Institute,Xidian University,Xi’an 710071 2National Computer Network Intrusion Protection Center,GUCAS, Beijing100049 Abstract We first do an in-depth security analysis of the authenticated key exchange protocol WAI in WAPI (WALN Authentication Privacy Infrastructure), point out its flaws and improve it. Next, we give...
متن کاملAuthentication and Key Exchange in Mobile Ad Hoc Networks
Over the past decade or so, there has been rapid growth in wireless and mobile applications technologies. More recently, an increasing emphasis has been on the potential of infrastructureless wireless mobile networks that are easy, fast and inexpensive to set up, with the view that such technologies will enable numerous new applications in a wide range of areas. Such networks are commonly refer...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Symmetry
سال: 2021
ISSN: ['0865-4824', '2226-1877']
DOI: https://doi.org/10.3390/sym13040698