2023
DOI: 10.3390/app13105945
|View full text |Cite
|
Sign up to set email alerts
|

Continuous Entity Authentication in the Internet of Things Scenario

Abstract: In the context of the Internet of Things (IoT), the proliferation of identity spoofing threats has led to the need for the constant entity verification of devices. Recently, a formal framework has been proposed to study resistance to impersonation attacks for One-Message Unilateral Entity Authentication (OM-UEA) schemes, in which the prover continuously authenticates itself through the use of a sequence of authentication messages. Given the limited computing power of the parties (particularly the prover) and t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 26 publications
0
0
0
Order By: Relevance
“…q(s t , a t )←q(s t , a t )+ξ(r t +ϑmax a q(s t+1 , a t+1 )−q(s t , a t )), (9) in which ξ ∈ [0, 1] represents the learning rate. Exploration and exploitation are two important processes in reinforcement learning, which should be properly handled to achieve a reasonable balance.…”
Section: Deep Reinforcement Learningmentioning
confidence: 99%
See 1 more Smart Citation
“…q(s t , a t )←q(s t , a t )+ξ(r t +ϑmax a q(s t+1 , a t+1 )−q(s t , a t )), (9) in which ξ ∈ [0, 1] represents the learning rate. Exploration and exploitation are two important processes in reinforcement learning, which should be properly handled to achieve a reasonable balance.…”
Section: Deep Reinforcement Learningmentioning
confidence: 99%
“…Thanks to the large number of widely deployed and diverse sensing terminal devices, the IoT can timely and comprehensively obtain the dynamic situation of the target area, and can provide managers with good decision-making and feedback interaction. However, the IoT also faces greater security risks at the same time, as the large number of terminals poses challenges for the access management of the IoT gateway [8][9][10][11]. Specifically, if the terminals cannot be authenticated in a timely and reliable manner, the IoT may face problems of low efficiency and network attacks.…”
Section: Introductionmentioning
confidence: 99%