2022
DOI: 10.1109/jiot.2021.3097996
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Authentication Scheme for Wireless Sensor Networks Based on DAC and Intel SGX

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 72 publications
0
7
0
Order By: Relevance
“…The Dynamic Authentication Credential (DAC) has been the subject of extensive study in recent years due to its proven ability to increase authentication security. A secure authentication approach for WSNs was devised by Liu et al [4] using DAC and Intel Software Guard Extensions (SGX). Since DAC rotation is not provided by alternative DAC authentication methods, this one is essential for preventing the asynchronous update problem caused by packet loss.…”
Section: Attack Detection Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…The Dynamic Authentication Credential (DAC) has been the subject of extensive study in recent years due to its proven ability to increase authentication security. A secure authentication approach for WSNs was devised by Liu et al [4] using DAC and Intel Software Guard Extensions (SGX). Since DAC rotation is not provided by alternative DAC authentication methods, this one is essential for preventing the asynchronous update problem caused by packet loss.…”
Section: Attack Detection Modelsmentioning
confidence: 99%
“…A sensor node, designed as a small, low-power device, is tasked with data acquisition. The inherent limitations of their batteries render the nodes with finite storage, memory, and processing capabilities, thereby increasing their susceptibility to security breaches [4]. Energy conservation within WSNs is paramount, as the network lifetimethe duration from deployment until the depletion of the first node's energy -directly impacts the effectiveness and longevity of the network [5].…”
Section: Introductionmentioning
confidence: 99%
“…However, after analyzing Das's scheme, some scholars [9][10][11] find that it has some security vulnerabilities, such as offline password guessing attack, node capture attack, lack of user anonymity, insider attack, and user impersonation attack and so on, and they put forward their improved schemes. It is worth noting that although different authentication protocols have been proposed in the WSN environment as shown in the literatures [12][13][14][15]63], Wang et al [16] point out that these schemes and similar protocols based on password and smartcard basically cannot meet the security requirements of WSN and they suffer from smartcard loss attack, which may lead to unexpected serious consequences. In order to better assess the security of the authentication scheme in the WSN environment in the industrial field, Wang et al, also put forward some evaluation criteria [17].…”
Section: Related Workmentioning
confidence: 99%
“…Due to the above security challenges of the IoV environment, researchers are committed to enhancing the security of the IoV. Therefore, a hardware-based, trusted execution environment called software guard extensions (SGX) [17][18][19] has emerged. SGX is secure hardware developed by Intel.…”
mentioning
confidence: 99%
“…In addition, SGX provides a trusted execution environment, as malicious code cannot access or tamper with any sensitive data stored in SGX, guaranteeing data confidentiality and integrity. The structure of SGX mentioned in [17]. Preserved random memory (PRM) is a reserved area for SGX in the dynamic memory, and the Enclave Page Cache (EPC) is a part of the PRM.…”
mentioning
confidence: 99%