“…Unfortunately, such arrangement leads to unlinkability issues under desynchronization attack. If A continuously disrupts the communication link between U i and S j by performing desynchronization attack [29,30], U i has to initiate more than one successive sessions using the same pseudonym [31]. Then, attackers can easily launch a tracing attack and link successive sessions of U i based on the transmitted pseudonym.…”
Use of Internet-of-Things (IoT)-based wireless applications has been exponentially increased nowadays and likely to accelerate in near future. Thus, a large volume of traffic needs to be managed at the application server. In such scenario, the traditional single-server architecture shows serious performance bottleneck and needs to be replaced by multiple servers. In addition, several security and design vulnerabilities may arise while accessing application data through various resource-constraint mobile devices. Thus, ensuring entity authentication, application data confidentiality and energy-efficient computations are essential. In this article, we introduce a group key-based lightweight Mutual Authentication and Key Agreement (MAKA) protocol for multi-server environment. The proposed protocol is designed using lowcost cryptographic primitives (such as hash function and symmetric key encryption/ decryption) to address energy-efficiency requirements of the resource-constraint mobile devices. It reduces computational burden of the registration center by distributing the traffic load into a group of servers. Additionally, registration center needs not to maintain one-to-one communication with its users whenever a new server is added to the system. The protocol achieves various security and design properties which are verified both formally and informally. Finally, we compare our protocol with others to show its applicability in real-life implementations.
“…Unfortunately, such arrangement leads to unlinkability issues under desynchronization attack. If A continuously disrupts the communication link between U i and S j by performing desynchronization attack [29,30], U i has to initiate more than one successive sessions using the same pseudonym [31]. Then, attackers can easily launch a tracing attack and link successive sessions of U i based on the transmitted pseudonym.…”
Use of Internet-of-Things (IoT)-based wireless applications has been exponentially increased nowadays and likely to accelerate in near future. Thus, a large volume of traffic needs to be managed at the application server. In such scenario, the traditional single-server architecture shows serious performance bottleneck and needs to be replaced by multiple servers. In addition, several security and design vulnerabilities may arise while accessing application data through various resource-constraint mobile devices. Thus, ensuring entity authentication, application data confidentiality and energy-efficient computations are essential. In this article, we introduce a group key-based lightweight Mutual Authentication and Key Agreement (MAKA) protocol for multi-server environment. The proposed protocol is designed using lowcost cryptographic primitives (such as hash function and symmetric key encryption/ decryption) to address energy-efficiency requirements of the resource-constraint mobile devices. It reduces computational burden of the registration center by distributing the traffic load into a group of servers. Additionally, registration center needs not to maintain one-to-one communication with its users whenever a new server is added to the system. The protocol achieves various security and design properties which are verified both formally and informally. Finally, we compare our protocol with others to show its applicability in real-life implementations.
“…Mobile apps, through location‐based traits, provide essential authentic information about providers (Lu et al, 2018), such as nearby locations, operating status or directions. Mobile apps, also, secure user information and usage of services (Roy & Bhattacharya, 2021). Thus, it can be concluded that authenticity is a key MSC content characteristic worthy of consideration as an antecedent of behavioural effects, this study aiming to probe further its influence.…”
Mobile social commerce (MSC) is exhibiting a growing interest from businesses and buyers due to the increasing number of mobile app users and combination of e‐commerce and sharing features of MSC platforms. The limited existing research on MSC recommends that the impact of MSC platform features/content on consumer behaviour should be further explored, while the social commerce literature emphasizes the necessity to investigate impulse buying (IB) and social participation (SP). Thus, this study adopted the Stimulus‐Organism‐Response (SOR) theory to investigate the impact of MSC content's usefulness, interactivity, entertainment and authenticity, built from the literature, on consumer emotions (arousal and pleasure), and their relationship with IB and SP. A sample of 345 Generation Y Chinese consumers was employed, while responses were collected through a survey, being used partial least squares (PLS) structural equation modelling to test our hypotheses. Significant relationships were established between the content characteristics and emotions, entertainment exhibiting the strongest impact on arousal, and authenticity on pleasure. Arousal had a significant impact on pleasure, and arousal and pleasure significantly affected IB and SP, with arousal displaying a stronger impact. This research expands the MSC theory through the grouping of content characteristics, documentation on the impact on consumer emotions, the relationship between arousal and pleasure, and the effect on both IB and SP, extending the SOR theory applicability. Practical recommendations for Generation Y MSC marketing are proposed. The model could be extended by introducing privacy concern, content personalization, perceived risk as independent factors, and trust and planned behaviour as explained variables.
“…Table 7 shows the comparison of the computational and storage costs of the proposed protocol with other protocols on the tag. It can be seen from the table that, the protocol proposed in literature [26] uses random number operation on the tag, the one proposed in literature [31] adopts pseudorandom number operation on the tag, the one proposed in literature [32] uses modular square operation on the tag, and the protocol proposed in literature [35]- [37] applies hash function on the tag. The cost of these operations is higher than that of the bit operation used in the protocol of this study.…”
Target tracking is one of the problems existing in the supply chain management. The use of radio frequency identification (RFID) in target tracking helps improve the monitoring accuracy and status visibility of the tracked target. For mobile RFID system, its three entities have to authenticate each other's identity in order to guarantee the data transmission security. The mobile RFID authentication protocol cannot achieve both high security and low complexity at the same time. For this problem, a new efficiency mobile RFID authentication protocol is proposed in this paper, which implements secure authentication among different communication entities by different operation modes. For example, the protocol adopts Hash Function between reader and cloud server, and exchange-cross bitwise operation between tag and cloud server, to achieve low computing cost at tag-end while improving the security of mobile communication data. At the cloud server end, the protocol proposed in this paper adopts index data table as the storage mode, which further improves the could server efficiency in retrieving the authentication of tags and readers, and reduces the risks of sensitive data disclosure. According to the security analysis, this protocol can resist impersonation attack, replay attack, trace attack and other attacks launched by attackers. Its security performance is further proved by BAN logic, proverif tool and random oracle model. On the other hand, the simple operation at the tag-end of the protocol lowers the tag cost to a larger extent.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.