2020
DOI: 10.1109/tii.2019.2963328
|View full text |Cite
|
Sign up to set email alerts
|

Faster Authenticated Key Agreement With Perfect Forward Secrecy for Industrial Internet-of-Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 46 publications
(17 citation statements)
references
References 42 publications
0
17
0
Order By: Relevance
“…(10) Impersonation threat: an impersonation attack occurs when an attacker impersonates a trusted contact to deceive a real user into revealing their identity or disclosing critical information. (11) Man-in-the-Middle threat: an unauthorized person intercepts a communication between two systems or individuals, posing a threat. e interceptor tries to eavesdrop on the conversation or impersonate one of the legitimate peers not to notice the intrusion.…”
Section: Reat Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…(10) Impersonation threat: an impersonation attack occurs when an attacker impersonates a trusted contact to deceive a real user into revealing their identity or disclosing critical information. (11) Man-in-the-Middle threat: an unauthorized person intercepts a communication between two systems or individuals, posing a threat. e interceptor tries to eavesdrop on the conversation or impersonate one of the legitimate peers not to notice the intrusion.…”
Section: Reat Modelmentioning
confidence: 99%
“…us, the proposed protocol resists replay attacks. (11) Resist to denial-of-service attacks: each session starts with a fresh and unique session key. e proposed scheme random number r 1 ,r 2 is very hard to compute while the proposed scheme checks Q / � Q, thus if A sends incorrect information to any participants, such request is rejected.…”
Section: Informal Security Analysismentioning
confidence: 99%
“…For example, a lightweight transport layer security protocol with perfect secrecy was proposed by Pengkun et al [ 50 ]. As another example, perfect secrecy is guaranteed to be provided by a high-performance key agreement protocol proposed by Yang et al [ 51 ].…”
Section: Entropy and Encryptionmentioning
confidence: 99%
“…The study outcome has found its security suitability on healthcare applications mainly. The work discussed by Yang et al [21] has emphasized achieving forward secrecy in order to protect the session keys. For this purpose, a dynamic session key is presented,strengthening the credential management system in industrial-based IoTwithout any dependencies towards using primitives of public-key encryption.…”
Section:  Blockchain-basedmentioning
confidence: 99%