[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Hammi et al., 2018 - Google Patents

A lightweight mutual authentication protocol for the IoT

Hammi et al., 2018

View PDF
Document ID
5721032557002010571
Author
Hammi M
Livolant E
Bellot P
Serhrouchni A
Minet P
Publication year
Publication venue
Mobile and Wireless Technologies 2017: ICMWT 2017 4

External Links

Snippet

Abstract The Internet of Things enables the interconnection of smart physical and virtual objects, managed by highly developed technologies. WSN, is an essential part of this paradigm. The WSN uses smart, autonomous and usually limited capacity devices in order …
Continue reading at hal.science (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0853Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls

Similar Documents

Publication Publication Date Title
Hammi et al. A lightweight mutual authentication protocol for the IoT
Gautam et al. A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks
Deebak et al. A smart lightweight privacy preservation scheme for IoT-based UAV communication systems
Tuna et al. A survey on information security threats and solutions for Machine to Machine (M2M) communications
Ning et al. Cyberentity security in the internet of things
Alimoradi et al. A hierarchical key management and authentication method for wireless sensor networks
Chom Thungon et al. A lightweight authentication and key exchange mechanism for IPv6 over low‐power wireless personal area networks‐based Internet of things
Mahalle et al. Identity driven capability based access control (ICAC) scheme for the Internet of Things
Ramasamy et al. E2DA: Energy efficient data aggregation and end-to-end security in 3D reconfigurable WSN
Jain et al. Securing wireless sensors in military applications through resilient authentication mechanism
Mohindru et al. A review on lightweight node authentication algorithms in wireless sensor networks
Lin et al. A role based privacy-aware secure routing protocol for wireless mesh networks
NV Application of SDN for secure communication in IoT environment
Aissani et al. µKMS: micro key management system for WSNs
Dang et al. The Meeting of Acquaintances: A Cost‐Efficient Authentication Scheme for Light‐Weight Objects with Transient Trust Level and Plurality Approach
Verma et al. A lightweight secure authentication protocol for wireless sensor networks
Saraswathi et al. Multi-stage key management scheme for cluster based WSN
Khan et al. An ECC-based mutual data access control protocol for next-generation public cloud
Rao et al. A deep learning-based authentication protocol for IoT-enabled LTE systems
Trivedi et al. Security and privacy aspects in the internet of things (IoT) and cyber-physical systems (CPS)
Perumalla et al. Secure communication using multilevel authentication strategy in Internet of Drones
Balaji et al. Novel Homomorphic Encryption for Mitigating Impersonation Attack in Fog Computing.
Chen et al. Design and Analysis of a Provable Secure Two‐Factor Authentication Protocol for Internet of Things
Serhrouchni et al. A lightweight mutual authentication protocol for the IoT
Chander et al. Secure, efficient, lightweight authentication in wireless sensor networks