2021 IEEE Conference on Dependable and Secure Computing (DSC) 2021
DOI: 10.1109/dsc49826.2021.9346263
|View full text |Cite
|
Sign up to set email alerts
|

Highly Efficient Anonymous IoT Authentication using Composite Hashing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 16 publications
0
0
0
Order By: Relevance
“…Chien [21][22], based on hashing and hash composition, propose an anonymous client-to-server authentication and an anonymous device-to-device authentication. In this paper, we modify and extend the anonymous client-toserver authentication in [20][21] to design and implement an anonymous client-to-broker authentication for MQTT 5.0. The differences between this work and several MQTT precedents are summarized here.…”
Section: Related Work and Backgroundmentioning
confidence: 99%
See 1 more Smart Citation
“…Chien [21][22], based on hashing and hash composition, propose an anonymous client-to-server authentication and an anonymous device-to-device authentication. In this paper, we modify and extend the anonymous client-toserver authentication in [20][21] to design and implement an anonymous client-to-broker authentication for MQTT 5.0. The differences between this work and several MQTT precedents are summarized here.…”
Section: Related Work and Backgroundmentioning
confidence: 99%
“…Some of these securityenhancement proposals provide hardware/architecture support for security protocols, some propose new symmetrickey-based/asymmetric-key-based security protocols, and some aim at designing authenticated key agreement schemes that are compatible with the previous MQTT packet formats and Application Interfaces (API). Chien [20][21] proposes general and efficient client-server authentication and deviceto-device authentication.…”
Section: Introductionmentioning
confidence: 99%
“…However, from the security analysis of much anonymous authentication protocols/anonymous key exchange protocols, in most instances, the anonymity of such protocols means that the participants' real identities are not involved in authentication and data transmissions [35], the probability that an attacker can determine the true identities of the protocol participants by executing the protocol [36] or observing the packets generated during the execution of the protocol is negligible [37]. In some protocols, pseudonyms are utilized to safeguard the anonymity of users, such as [37,38]. Cao and Wei [36] defined user anonymity as shown in Equation (14).…”
Section: Session the Further Analysis Usesmentioning
confidence: 99%