Nothing Special   »   [go: up one dir, main page]

Elhajj et al., 2022 - Google Patents

Lasii: Lightweight authentication scheme using iota in iot platforms

Elhajj et al., 2022

View PDF
Document ID
15725558868948980156
Author
Elhajj M
Jradi H
Chamoun M
Fadlallah A
Publication year
Publication venue
2022 20th Mediterranean Communication and Computer Networking Conference (MedComNet)

External Links

Snippet

Internet of Things (IoT) has emerged as a key technology with a large spectrum of applications in various fields. However, it still faces several security challenges, in particular authentication-related challenges. Efficient “traditional” authentication solutions are often …
Continue reading at research.utwente.nl (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic

Similar Documents

Publication Publication Date Title
Park et al. BPPS: Blockchain-enabled privacy-preserving scheme for demand-response management in smart grid environments
Deebak et al. A lightweight blockchain-based remote mutual authentication for AI-empowered IoT sustainable computing systems
Ding et al. A novel attribute-based access control scheme using blockchain for IoT
Ma et al. Privacy-oriented blockchain-based distributed key management architecture for hierarchical access control in the IoT scenario
Salman et al. Security services using blockchains: A state of the art survey
Jia et al. A blockchain-assisted privacy-aware authentication scheme for Internet of Medical Things
US12200117B2 (en) Credential generation and distribution method and system for a blockchain network
Zhang et al. Efficient and privacy-preserving blockchain-based multifactor device authentication protocol for cross-domain IIoT
Xue et al. A cross-domain authentication scheme based on cooperative blockchains functioning with revocation for medical consortiums
Abed et al. A review on blockchain and IoT integration from energy, security and hardware perspectives
Elhajj et al. Lasii: Lightweight authentication scheme using iota in iot platforms
Ayub et al. Secure consumer-centric demand response management in resilient smart grid as industry 5.0 application with blockchain-based authentication
Dwivedi et al. B-HAS: Blockchain-assisted efficient handover authentication and secure communication protocol in VANETs
El-Hajj et al. Ethereum for secure authentication of iot using pre-shared keys (psks)
Nasr Esfahani et al. End-to-end privacy preserving scheme for IoT-based healthcare systems
Goswami et al. A blockchain-based authentication scheme for 5g-enabled iot
Li et al. Smart Contract‐Based Cross‐Domain Authentication and Key Agreement System for Heterogeneous Wireless Networks
Naseer et al. Blockchain-based decentralized lightweight control access scheme for smart grids
Li et al. DAC4SH: A novel data access control scheme for smart home using smart contracts
Riaz et al. BAS: the biphase authentication scheme for wireless sensor networks
Li et al. Designated-verifier aggregate signature scheme with sensitive data privacy protection for permissioned blockchain-assisted IIoT
Perugini et al. On the integration of Self-Sovereign Identity with TLS 1.3 handshake to build trust in IoT systems
Zhao et al. A novel decentralized cross‐domain identity authentication protocol based on blockchain
Shahidinejad et al. Decentralized lattice-based device-to-device authentication for the edge-enabled IoT
Braeken Authenticated key agreement protocols for dew-assisted IoT systems