Hash-MAC-DSDV: Mutual Authentication for Intelligent IoT-Based Cyber-Physical Systems

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hash-Based Mutual Authentication Protocol for Low-Cost RFID Systems

In the last decade RFID technology has become widespread. It can be found in various fields of our daily life. Due to the rapid development more and more security problems were raised. Since tags have limited memory and very low computational capacity a so-called lightweight authentication is needed. Several protocols have been proposed to resolve security and privacy issues in RFID systems. Ho...

متن کامل

Cyber-Physical Microservices: An IoT-based Framework for Manufacturing Systems

Recent advances in ICT enable the evolution of the manufacturing industry to meet the new requirements of the society. Cyber-physical systems, Internet-of-Things (IoT), and Cloud computing, play a key role in the fourth industrial revolution known as Industry 4.0. The microservice architecture has evolved as an alternative to SOA and promises to address many of the challenges in software develo...

متن کامل

Cyber Physical Security for Industrial Control Systems and IoT

Cyber-attacks and cybersecurity used to be the issues for those who use Internet and computers. The issues, however, are expanding to anyone who does not even use them directly. The society is gradually and heavily depending on networks and computers. They are not closed within a cyberspace anymore and having interaction with our real world with sensors and actuators. Such systems are known as ...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Internet of Things Journal

سال: 2021

ISSN: 2327-4662,2372-2541

DOI: 10.1109/jiot.2021.3083731