2023
DOI: 10.3390/su15075934
|View full text |Cite
|
Sign up to set email alerts
|

Toward Designing a Secure Authentication Protocol for IoT Environments

Abstract: Authentication protocol is a critical part of any application to manage the access control in many applications. A former research recently proposed a lightweight authentication scheme to transmit data in an IoT subsystem securely. Although the designers presented the first security analysis of the proposed protocol, that protocol has not been independently analyzed by third-party researchers, to the best of our knowledge. On the other hand, it is generally agreed that no cryptosystem should be used in a pract… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 75 publications
0
1
0
Order By: Relevance
“…A privileged insider adversary is assumed to have more capability compared to an inherent adversary. A common capability could be its access to the stored data in the memory of the transferred data through secure channels, for example during the registration phase of a protocol 37 , 38 . Following this fact, we evaluate the security of EV-PUF.…”
Section: Security Analysis Of Ev-pufmentioning
confidence: 99%
“…A privileged insider adversary is assumed to have more capability compared to an inherent adversary. A common capability could be its access to the stored data in the memory of the transferred data through secure channels, for example during the registration phase of a protocol 37 , 38 . Following this fact, we evaluate the security of EV-PUF.…”
Section: Security Analysis Of Ev-pufmentioning
confidence: 99%