Explore chapters and articles related to this topic
Attacks and Remedies
Published in Chintan Patel, Nishant Doshi, Internet of Things Security, 2018
Forward secrecy can be defined as “protecting the earlier history if the current security is broken”. Perfect forward secrecy is the mechanism that ensures that if the server is attacked and compromised then the entire system of communication will not be null and void. So a scheme with perfect forward secrecy makes sure that even when the long-term secret key of the server is attacked and attacker obtains, it, then attacker must not: get the older session keysdecrypt the old communicationcompute the next session keysencrypt the plain text in a similar way authenticated user is encrypting
Guarded dual authentication based DRM with resurgence dynamic encryption techniques
Published in Enterprise Information Systems, 2019
Neha Agarwal, Ajay Rana, J.P. Pandey
The initial values of the chain may lead the cellular phones to execute the hash functions several times. This method makes use of single-way collision free hash functions which is appropriately faster. This system also needs common authentication, which helps to make less complicated. Another major performance of this schemes is, not even a bit of data is saved within a user system like smart phones then tablets, simultaneously it makes the system less affected but more processing efficient and utilize less memory. Taking the above said advantages of our proposed scheme, it is tabulated in the Table 2 by comparing Operational mechanism, Forward secrecy, Scheme efficiency, Password change, Lost or stolen, Cloud based,authentication, Cost efficient (cloud computing) with the other scheme like EPPDR,IBA,TEES. It has been proved that our proposed scheme works well than the others.
A lightweight D2D security protocol with request-forecasting for next-generation mobile networks
Published in Connection Science, 2022
Daniel Gerbi Duguma, Jiyoon Kim, Sangmin Lee, Nam-Su Jho, Vishal Sharma, Ilsun You
Despite their broad uses and rising popularity, IoTs have been associated with a slew of security and privacy issues, according to several researches (Caputo et al., 2020; He et al., 2021; Liu et al., 2020; Schafer & Edwards, 2017; Wong & Yiu, 2020). D2D communication, which is expected to be utilized by resource constrained IoT devices, should consider the appropriate security and privacy requirements for the aforementioned possible concerns. The following are the security criteria for D2D communication as identified in Zhang and Lin (2017). Lightweight cryptographic operation: an authentication and key agreement protocol should fully acknowledge the limited resources concerning power, processing, storage, and communication posed on D2D communication.Anonymity: it should be difficult, if not impossible, to reveal the information, location, and identity of devices through messages sent and received during the device discovery process.Mutual Authentication: the devices participating in the D2D communication should know whom they are talking to and vice versa.Confidentiality: after a successful key exchange, the attacker should not obtain the key and the plain data protected by it.Integrity: an unauthorized user should not modify the protected message transmitting between the D2D users.Perfect Forward Secrecy: an attacker should not obtain the D2D session participants’ current session keys from the previous session key.
Design of An Authentication Scheme for Cloud-Based IoT Applications*
Published in IETE Technical Review, 2022
Sampa Sahoo, Shreeya Swagatika Sahoo, Bibhudatta Sahoo, Ashok Kumar Turuk
The perfect forward secrecy intends to the compromise of random number will not reveal the previous session key. However, the adversary can not compute the session key without knowledge of user identity and password as , , . Hence, the scheme can withstand perfect forward secrecy.