Elhajj et al., 2022 - Google Patents
Lasii: Lightweight authentication scheme using iota in iot platformsElhajj et al., 2022
View PDF- Document ID
- 15725558868948980156
- Author
- Elhajj M
- Jradi H
- Chamoun M
- Fadlallah A
- Publication year
- Publication venue
- 2022 20th Mediterranean Communication and Computer Networking Conference (MedComNet)
External Links
Snippet
Internet of Things (IoT) has emerged as a key technology with a large spectrum of applications in various fields. However, it still faces several security challenges, in particular authentication-related challenges. Efficient “traditional” authentication solutions are often …
- 238000005516 engineering process 0 abstract description 17
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Park et al. | BPPS: Blockchain-enabled privacy-preserving scheme for demand-response management in smart grid environments | |
Deebak et al. | A lightweight blockchain-based remote mutual authentication for AI-empowered IoT sustainable computing systems | |
Ding et al. | A novel attribute-based access control scheme using blockchain for IoT | |
Ma et al. | Privacy-oriented blockchain-based distributed key management architecture for hierarchical access control in the IoT scenario | |
Salman et al. | Security services using blockchains: A state of the art survey | |
Jia et al. | A blockchain-assisted privacy-aware authentication scheme for Internet of Medical Things | |
US12200117B2 (en) | Credential generation and distribution method and system for a blockchain network | |
Zhang et al. | Efficient and privacy-preserving blockchain-based multifactor device authentication protocol for cross-domain IIoT | |
Xue et al. | A cross-domain authentication scheme based on cooperative blockchains functioning with revocation for medical consortiums | |
Abed et al. | A review on blockchain and IoT integration from energy, security and hardware perspectives | |
Elhajj et al. | Lasii: Lightweight authentication scheme using iota in iot platforms | |
Ayub et al. | Secure consumer-centric demand response management in resilient smart grid as industry 5.0 application with blockchain-based authentication | |
Dwivedi et al. | B-HAS: Blockchain-assisted efficient handover authentication and secure communication protocol in VANETs | |
El-Hajj et al. | Ethereum for secure authentication of iot using pre-shared keys (psks) | |
Nasr Esfahani et al. | End-to-end privacy preserving scheme for IoT-based healthcare systems | |
Goswami et al. | A blockchain-based authentication scheme for 5g-enabled iot | |
Li et al. | Smart Contract‐Based Cross‐Domain Authentication and Key Agreement System for Heterogeneous Wireless Networks | |
Naseer et al. | Blockchain-based decentralized lightweight control access scheme for smart grids | |
Li et al. | DAC4SH: A novel data access control scheme for smart home using smart contracts | |
Riaz et al. | BAS: the biphase authentication scheme for wireless sensor networks | |
Li et al. | Designated-verifier aggregate signature scheme with sensitive data privacy protection for permissioned blockchain-assisted IIoT | |
Perugini et al. | On the integration of Self-Sovereign Identity with TLS 1.3 handshake to build trust in IoT systems | |
Zhao et al. | A novel decentralized cross‐domain identity authentication protocol based on blockchain | |
Shahidinejad et al. | Decentralized lattice-based device-to-device authentication for the edge-enabled IoT | |
Braeken | Authenticated key agreement protocols for dew-assisted IoT systems |