当前位置: X-MOL 学术Pervasive Mob. Comput. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Secure and anonymous authentication scheme for the Internet of Things with pairing
Pervasive and Mobile Computing ( IF 3.0 ) Pub Date : 2020-06-18 , DOI: 10.1016/j.pmcj.2020.101177
Hsiao-Ling Wu , Chin-Chen Chang , Long-Sheng Chen

The Internet of Things technology allows devices automatically connect with others or a server for the purposes of exchanging data. People can conveniently integrate data from those devices for a smart home, vehicular ad-hoc network, e-Health, etc. In 2017, Wang et al. proposed a simple authentication scheme for the Internet of Things. Although they formally proved that their scheme is secure, they did not consider the privacy of devices and stolen verifier attack. In this paper, we first demonstrate the weaknesses of Wang et al.’s scheme. Accordingly, we present a higher security level authentication scheme to resist the above weaknesses.



中文翻译:

具有配对功能的物联网安全匿名认证方案

物联网技术允许设备自动与其他设备或服务器连接,以交换数据。人们可以方便地集成来自那些设备的数据,以用于智能家居,车载自组织网络,e-Health等。在2017年,Wang等人。提出了一种简单的物联网身份验证方案。尽管他们正式证明了自己的方案是安全的,但他们并未考虑设备的私密性和验证者攻击被盗。在本文中,我们首先证明了Wang等人方案的弱点。因此,我们提出了一种更高的安全级别认证方案,以克服上述缺陷。

更新日期:2020-06-18
down
wechat
bug