2019 IEEE 19th International Conference on Communication Technology (ICCT) 2019
DOI: 10.1109/icct46805.2019.8947038
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of a Multichannel Lightweight Identity Authentication Method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Multi-channel transmission can simultaneously transmit data over multiple channels in parallel to improve the successful transmission rate and avoid an unreachable problem due to noise or interference in the case of a single channel. However, the risk is that repeated transmission affords the attacker the opportunity to listen to the data many times, which increases the probability of successful interception and reduces security [40,41]. After obtaining the transmitted data in the blockchain network, the attacker may carry out man-in-the-middle attacks and identity forgery attacks.…”
Section: Mtsd Methodsmentioning
confidence: 99%
“…Multi-channel transmission can simultaneously transmit data over multiple channels in parallel to improve the successful transmission rate and avoid an unreachable problem due to noise or interference in the case of a single channel. However, the risk is that repeated transmission affords the attacker the opportunity to listen to the data many times, which increases the probability of successful interception and reduces security [40,41]. After obtaining the transmitted data in the blockchain network, the attacker may carry out man-in-the-middle attacks and identity forgery attacks.…”
Section: Mtsd Methodsmentioning
confidence: 99%
“…The personal server must establish a secure channel between itself and an IoMT device. Moreover, the patient health data stored on the personal server should be accessed by the medical staff, patients and legitimate users; thus effective authentication methods such as lightweight identity authentication proposed in [116] are required in this respect. • Medical server level: For getting access to the patients' data, effective access control methods should be developed.…”
Section: B: Iomt Security and Privacymentioning
confidence: 99%
“…In addition, we will continue to explore more DFA approaches to other lightweight block ciphers. Finally, we will discuss the security of various cryptographic application scenarios, such as privacy protection [31][32] and identity authentication [33].…”
mentioning
confidence: 99%