Hammi et al., 2018 - Google Patents
A lightweight mutual authentication protocol for the IoTHammi et al., 2018
View PDF- Document ID
- 5721032557002010571
- Author
- Hammi M
- Livolant E
- Bellot P
- Serhrouchni A
- Minet P
- Publication year
- Publication venue
- Mobile and Wireless Technologies 2017: ICMWT 2017 4
External Links
Snippet
Abstract The Internet of Things enables the interconnection of smart physical and virtual objects, managed by highly developed technologies. WSN, is an essential part of this paradigm. The WSN uses smart, autonomous and usually limited capacity devices in order …
- 101710025892 otpb 0 description 9
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0853—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hammi et al. | A lightweight mutual authentication protocol for the IoT | |
Gautam et al. | A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks | |
Deebak et al. | A smart lightweight privacy preservation scheme for IoT-based UAV communication systems | |
Tuna et al. | A survey on information security threats and solutions for Machine to Machine (M2M) communications | |
Ning et al. | Cyberentity security in the internet of things | |
Alimoradi et al. | A hierarchical key management and authentication method for wireless sensor networks | |
Chom Thungon et al. | A lightweight authentication and key exchange mechanism for IPv6 over low‐power wireless personal area networks‐based Internet of things | |
Mahalle et al. | Identity driven capability based access control (ICAC) scheme for the Internet of Things | |
Ramasamy et al. | E2DA: Energy efficient data aggregation and end-to-end security in 3D reconfigurable WSN | |
Jain et al. | Securing wireless sensors in military applications through resilient authentication mechanism | |
Mohindru et al. | A review on lightweight node authentication algorithms in wireless sensor networks | |
Lin et al. | A role based privacy-aware secure routing protocol for wireless mesh networks | |
NV | Application of SDN for secure communication in IoT environment | |
Aissani et al. | µKMS: micro key management system for WSNs | |
Dang et al. | The Meeting of Acquaintances: A Cost‐Efficient Authentication Scheme for Light‐Weight Objects with Transient Trust Level and Plurality Approach | |
Verma et al. | A lightweight secure authentication protocol for wireless sensor networks | |
Saraswathi et al. | Multi-stage key management scheme for cluster based WSN | |
Khan et al. | An ECC-based mutual data access control protocol for next-generation public cloud | |
Rao et al. | A deep learning-based authentication protocol for IoT-enabled LTE systems | |
Trivedi et al. | Security and privacy aspects in the internet of things (IoT) and cyber-physical systems (CPS) | |
Perumalla et al. | Secure communication using multilevel authentication strategy in Internet of Drones | |
Balaji et al. | Novel Homomorphic Encryption for Mitigating Impersonation Attack in Fog Computing. | |
Chen et al. | Design and Analysis of a Provable Secure Two‐Factor Authentication Protocol for Internet of Things | |
Serhrouchni et al. | A lightweight mutual authentication protocol for the IoT | |
Chander et al. | Secure, efficient, lightweight authentication in wireless sensor networks |