2022
DOI: 10.1109/tii.2021.3129631
|View full text |Cite
|
Sign up to set email alerts
|

A Time-Sensitive Token-Based Anonymous Authentication and Dynamic Group Key Agreement Scheme for Industry 5.0

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 44 publications
(6 citation statements)
references
References 23 publications
0
6
0
Order By: Relevance
“…DT makes full use of the physical model, sensor update, and other functions to complete the mapping of real physical systems in virtual space so as to reflect the whole life cycle process of corresponding physical equipment. DT systems are widely used in various digital systems 13–15 and other scenarios, for example, combining DT technology with blockchain technology. DT technology can build a DT of a car and record all relevant information about the car, while blockchain technology can solve the problem of information security in the used car market 16–18 .…”
Section: Related Workmentioning
confidence: 99%
“…DT makes full use of the physical model, sensor update, and other functions to complete the mapping of real physical systems in virtual space so as to reflect the whole life cycle process of corresponding physical equipment. DT systems are widely used in various digital systems 13–15 and other scenarios, for example, combining DT technology with blockchain technology. DT technology can build a DT of a car and record all relevant information about the car, while blockchain technology can solve the problem of information security in the used car market 16–18 .…”
Section: Related Workmentioning
confidence: 99%
“…In [ 269 ], Xu et al proposed an authentication framework using blockchain and token mechanism. After authentication, a device will get a token that will be valid for a certain timezone.…”
Section: Iot Security Solutionsmentioning
confidence: 99%
“…Figure. 6 shows the experimental testbed of Loki. Loki follows the FIDO2 specifications, which implies it uses public-key cryptosystem for device attestation.…”
Section: E Attack Model Used To Validate Lokimentioning
confidence: 99%
“…Passwordless authentication has been instrumental in eliminating most attacks that traditional passwords are vulnerable to [5], [6]. FIDO [7] specifications allow the usage of physical security keys with the public key cryptosystem.…”
Section: Introductionmentioning
confidence: 99%