2021
DOI: 10.3390/electronics10070789
|View full text |Cite
|
Sign up to set email alerts
|

Two-Level-Composite-Hashing Facilitating Highly Efficient Anonymous IoT and D2D Authentication

Abstract: Resource limitation is quite popular in many Internet of Things (IoT) devices and eavesdropping on the identities of IoT devices could reveal the sensitive information; therefore, high efficiency (computation and communication) and anonymity protection are two desirable properties in IoT authentication and in device-to-device (D2D) authentication. Conventionally, dynamic pseudonyms are widely adopted to protect the device identity privacy in IoT authentication and in D2D communications; however, the convention… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 36 publications
0
1
0
Order By: Relevance
“…Digital signatures that can be used for authentication are generated using elliptic curve cryptography. Lastly, a process called hashing [140,141], in which the data is converted into a code of a set length, can be used to assure data integrity. This technique ensures that no data has been altered in transit.…”
Section: Cryptographic Paradigm In Iotmentioning
confidence: 99%
“…Digital signatures that can be used for authentication are generated using elliptic curve cryptography. Lastly, a process called hashing [140,141], in which the data is converted into a code of a set length, can be used to assure data integrity. This technique ensures that no data has been altered in transit.…”
Section: Cryptographic Paradigm In Iotmentioning
confidence: 99%
“…So, an attacker may get access to the plaintext-ciphertext pair. Chien [33] uses the ECC encryption and double hash approach to resist anonymity attacks and also preserves the synchronizing pseudonyms. Hajian et al [34] proposed a security scheme that improves the previous approaches but lacks anonymity.…”
Section: Related Workmentioning
confidence: 99%
“…However, wireless networks are open and heterogeneous, so that they are vulnerable to various security attacks. Attackers can disrupt user communication security through eavesdropping, interception, tampering, and other methods, steal user privacy data, and seriously threaten IoT communication security [9]. In addition, the computing and storage resources of IoT devices are limited, and complex cryptographic primitives cannot be used to protect their security.…”
Section: Significance and Motivationmentioning
confidence: 99%