Hash-MAC-DSDV: Mutual Authentication for Intelligent IoT-Based Cyber–Physical Systems
نویسندگان
چکیده
Cyber–physical systems (CPS) connected in the form of Internet Things (IoT) are vulnerable to various security threats, due infrastructure-less deployment IoT devices. Device-to-Device (D2D) authentication these networks ensures integrity, authenticity, and confidentiality information deployed area. The literature suggests different approaches address issues CPS technologies. However, they mostly based on centralized techniques or specific system deployments with a higher cost computation communication. It is therefore necessary develop an effective scheme that can resolve problems technologies In this article, lightweight hash media access control destination sequence distance vector (Hash-MAC-DSDV) routing proposed technologies, networks. For purpose, devices (multi-WSNs) developed from local chain public chain, respectively. D2D by Hash-MAC-DSDV mutual scheme, where MAC addresses individual registered first phase advertised network second phase. allows legitimate modify their table unicast one-way mechanism transfer captured data source toward destination. Our evaluation results demonstrate outweighs existing schemes terms attack detection, energy consumption, communication metrics.
منابع مشابه
Hash-Based Mutual Authentication Protocol for Low-Cost RFID Systems
In the last decade RFID technology has become widespread. It can be found in various fields of our daily life. Due to the rapid development more and more security problems were raised. Since tags have limited memory and very low computational capacity a so-called lightweight authentication is needed. Several protocols have been proposed to resolve security and privacy issues in RFID systems. Ho...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملAn Efficient Improvement on Safkhani et al.’s Hash-Based Mutual Authentication Protocol for RFID Systems
Nowadays, plenty of radio frequency identification (RFID) systems have been proposed and used in the real world for convenience. An RFID system requires advanced properties of confidentiality, indistinguishability, forward security and mutual authentication to provide a higher security level. Safkhani et al. proposed a hash-based authentication protocol for RFID systems. Though their protocol p...
متن کاملCryptanalysis of Cho et al.'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems
Radio frequency identification systems need protocols to provide confidentiality, user privacy, mutual authentication and etc. These protocols should resist active and passive attacks such as forgery, traceability, replay and desynchronization attacks. In this paper we cryptanalysis a hash based RFID mutual authentication protocol which has been recently proposed by Cho et al. More precisely, w...
متن کاملA Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Internet of Things Journal
سال: 2022
ISSN: ['2372-2541', '2327-4662']
DOI: https://doi.org/10.1109/jiot.2021.3083731