2023
DOI: 10.3389/fphy.2023.1210777
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight and secure D2D group communication for wireless IoT

Abstract: In recent years, wirless Internet of Things (IoT) technology has developed rapidly, and the reuse of spectrum resources, network efficiency, and the diversity of multi-communication scenarios have brought great challenges to the existing Internet of Things. And Device to Device (D2D) communication technology in 5th Generation Mobile Communication Technology (5G) has good application prospects in these aspects. Therefore, the combination with D2D can well solve the needs in the wirless Internet of things. Howev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 37 publications
(50 reference statements)
0
3
0
Order By: Relevance
“…However, the attacker cannot obtain the user password, and it is difficult for the attacker to log in successfully and authenticate. (11) Forward security Assuming that the main key s of CSC is leaked and that the attacker has intercepted all communication content on the channel, they will want to crack the previous session key. At this point, the attacker needs to calculate SK 3 = H(CK 3 ||I 1 ||E 1 ||D 1 ||ID c ); however, the secret value of CK 3 is calculated using a chaotic mapping algorithm.…”
Section: (8) Verification Table Loss Attackmentioning
confidence: 99%
See 2 more Smart Citations
“…However, the attacker cannot obtain the user password, and it is difficult for the attacker to log in successfully and authenticate. (11) Forward security Assuming that the main key s of CSC is leaked and that the attacker has intercepted all communication content on the channel, they will want to crack the previous session key. At this point, the attacker needs to calculate SK 3 = H(CK 3 ||I 1 ||E 1 ||D 1 ||ID c ); however, the secret value of CK 3 is calculated using a chaotic mapping algorithm.…”
Section: (8) Verification Table Loss Attackmentioning
confidence: 99%
“…(10) IoT device compromise When an IoT device is compromised, the informa obtained by attackers. However, the attacker cannot o difficult for the attacker to log in successfully and authe (11) Forward security Assuming that the main key s of CSC is leaked an all communication content on the channel, they will w key. At this point, the attacker needs to calculate 𝑆𝐾 = the secret value of 𝐶𝐾 is calculated using a chaotic ma an attacker calculates 𝐶𝐾 , they will face the CDHP di shev polynomials, which is almost impossible to calcul…”
Section: 𝑃𝑊mentioning
confidence: 99%
See 1 more Smart Citation
“…This paper will adopt the universally considered threat model in the IoT security threat model [11]. Like most authentication schemes, this paper first considers the Dolev-Yao threat model [27].…”
Section: Threat Modelmentioning
confidence: 99%
“…As the increasing scale of terminal access devices and data, some criminals launch malicious attacks by finding, utilizing or controlling Internet of things devices with security vulnerabilities [10]. Therefore, security issues are not only related to the interests of users, but also have a great impact on economic development, social stability and national security [11]. Here, we need to use cryptographic theory and technology to build a scheme to provide a comprehensive security mechanism.…”
Section: Introductionmentioning
confidence: 99%