2022
DOI: 10.1002/ett.4479
|View full text |Cite
|
Sign up to set email alerts
|

Continuous lightweight authentication according group priority and key agreement for Internet of Things

Abstract: In the IoT, authentication is challenged by the limited resources of devices. Most existing continuous authentications require plenty of memory and computing. Also, the time interval between static authentications is fixed, and no attention is paid to the importance of their traffic. Therefore, in this article, we propose a lightweight protocol for mutual authentication between nodes and servers in IoT. To this aim, the nodes have been divided into three priority groups, and for the high priority group, a long… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 55 publications
0
4
0
Order By: Relevance
“…4 Some of the potential attacks that could be launched over the medical IoT are man-in-the-middle (MITM) attack, impersonation attack, eavesdropping attack, gateway device level attack, sensor node level attack, DoS attack, attack against mutual authentication, insider attack and, attack on transaction history information-based user authentication. 5 As the patient medical data contains sensitive and private information, the attackers can try to read the information in a passive attacks or even try modify the sensitive data in active attacks. The primary objective of medical IoT is to ensure that data is only available to legitimate users, which is accomplished through the user authentication process.…”
Section: F I G U R Ementioning
confidence: 99%
See 1 more Smart Citation
“…4 Some of the potential attacks that could be launched over the medical IoT are man-in-the-middle (MITM) attack, impersonation attack, eavesdropping attack, gateway device level attack, sensor node level attack, DoS attack, attack against mutual authentication, insider attack and, attack on transaction history information-based user authentication. 5 As the patient medical data contains sensitive and private information, the attackers can try to read the information in a passive attacks or even try modify the sensitive data in active attacks. The primary objective of medical IoT is to ensure that data is only available to legitimate users, which is accomplished through the user authentication process.…”
Section: F I G U R Ementioning
confidence: 99%
“…IGHFHE.KeySwitch(C NAND T , KS i ) The switching key "KS i " includes ciphertexts and the secret key is given by SEC * KEY ← [0, 1] n * . The ciphertext "C S NAND T " is found using "C NAND T " and "SEC * KEY " based on Equation (5).…”
Section: Ighfhehomomorphic Nand (C I C J )mentioning
confidence: 99%
“…However, this authentication scheme was found to be not only vulnerable to impersonation attacks, denial of service attacks and replay attacks, but also lacked a native password mechanism to detect bad passwords [33], [34]. Sarabi et al [23] proposed a lightweight protocol for mutual authentication between nodes and servers in IoT. Divide nodes into three priority groups, and each group node performs static authentication and generates a token at the beginning of the interval.…”
Section: Cross-domain Identity Authenticationmentioning
confidence: 99%
“…The trusted center also cannot provide trusted traceability services to locate illegal acts, and may not be able to eliminating malicious users. In addition, there exist other schemes based on lightweight cryptographic primitives for identity authentication [20], [21], [22], [23], [24]. However, these schemes have some drawbacks, including lack of intra-or crossdomain authentication capability as well as inability to resist replay attacks, insider attacks, and session key leak attacks.…”
Section: Introductionmentioning
confidence: 99%