2023
DOI: 10.1016/j.comcom.2023.01.013
|View full text |Cite
|
Sign up to set email alerts
|

IBA: A secure and efficient device-to-device interaction-based authentication scheme for Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 31 publications
0
2
0
Order By: Relevance
“…The described scheme employs a public-private key pair for authentication in IoT devices. Yang et al [34] introduced as an interaction-based authentication (IBA) scheme, it addresses security and efficiency challenges in IoT networks. IBA utilizes device characteristics from previous interactions to securely authenticate through element matching, eliminating the need for a constant connection to trusted third parties.…”
Section: Public Key Infrastructurementioning
confidence: 99%
“…The described scheme employs a public-private key pair for authentication in IoT devices. Yang et al [34] introduced as an interaction-based authentication (IBA) scheme, it addresses security and efficiency challenges in IoT networks. IBA utilizes device characteristics from previous interactions to securely authenticate through element matching, eliminating the need for a constant connection to trusted third parties.…”
Section: Public Key Infrastructurementioning
confidence: 99%
“…Or else, it proves that U i is a legitimate user who has registered with GWN. Then, GWN selects three random numbers N 2 Î Z q * , x Î Z q * , x 2 Î Z q * and calculates the temporary credentials TC j of S j and three values F 4 , F 5 , F 6 according to equation (12).…”
Section: Login and Key Agreement Phasementioning
confidence: 99%
“…Meanwhile, after GWN authenticates S j in the login and key agreement phase, it updates PID i by equation ( 21) and transmits it to U i , which means that U i 􀆳 s pseudo-identity is dynamic. Usually, an attacker intercepts messages from different sessions and tries to find the relationship between them to determine whether they belong to the same device [12] . In the proposed scheme, GWN does not transmit PID i new directly through a public channel after it updates PID i , but protects PID i new by equation ( 22) before transmitting F 11 .…”
Section: User Untraceabilitymentioning
confidence: 99%
“…In recent years, the rapid advancement of information technology has seen a surge in IoT device deployment across various industries, fostering innovative applications like smart healthcare [1], smart homes [2], and smart industries [3]. The ongoing push for national smart city initiatives has further fueled this proliferation, resulting in a vast influx of private data generated by IoT devices [4][5][6]. According to forecasts by the International Data Corporation (IDC), 2025 is projected to witness a staggering 41.6 billion IoT devices generating an estimated 79.4 ZB of data [7].…”
Section: Introductionmentioning
confidence: 99%