Explore chapters and articles related to this topic
Reliable Data Transmission Using Biometric Authentication Methodology in IoT
Published in Syed Rameem Zahra, Mohammad Ahsan Chishti, Security and Privacy in the Internet of Things, 2020
Authentication can be one-way or mutual. The procedure is a process where the communicating party is confirming its identity to the other party during this procedure. In one-way authentication, only the client will be verifying its identity, whereas in mutual authentication procedure, both the parties affirm their identities before commencing with the transmission of data.
1
Published in Fadi Al-Turjman, Security in IoT-Enabled Spaces, 2019
Mutual Authentication: In the mutual authentication, the two communication parties authenticate each other for the purpose of secure communication establishment. In the proposed scheme, the patient and doctor authenticate each other using sska−gw=H(SN⊕IDgw). In the system login and authentication phase, the authentic-gateway access server authenticates the patient / doctor using the computation of D=DJ[Mid*∥IDgw*] and Dk[CIDi]=Ek[H(Mid∥M∥SN] to verify whether the patient / doctor satisfies the conditional expression of Vi=ESKgw[Mid∥SN∥M∥Tc'''] to access the data being transmitted. Though the adversary intercept the login request-message of either patient or doctor and wishes to forge as a legitimate authentic-gateway server, the adversary cannot compute the parameters’ like {H(.),C,Ni,Skey}. Subsequently, the adversary cannot send a valid response-message to the authentic-gateway server. Hence, the proposed scheme asserts that it holds the security property of mutual authentication.
Secure Access for Mobile Applications in Industrial IoT
Published in Fadi Al-Turjman, Smart Things and Femtocells, 2018
Mutual Authentication: In the mutual authentication, the two communication parties authenticate each other for the purpose of secure communication establishment. In the proposed scheme, the patient and doctor authenticate each other using sska−gw=H(SN⊕IDgw). In the system login and authentication phase, the authentic-gateway access server authenticates the patient/doctor using the computation of D=DJ[Mid*∥IDgw*] and Dk[CIDi]=Ek[H(Mid∥M∥SN] to verify whether the patient/doctor satisfies the conditional expression of Vi=ESKgw[Mid∥SN∥M∥T‴c] to access the data being transmitted. Though the adversary intercepts the login request-message of either patient or doctor and wishes to forge as a legitimate authentic-gateway server, the adversary cannot compute the parameters’ like {H(⋅),C,Ni,Skey}. Subsequently, the adversary cannot send a valid response-message to the authentic-gateway server. Hence, the proposed scheme asserts that it holds the security property of mutual authentication.
Exploring the RFID mutual authentication domain
Published in International Journal of Computers and Applications, 2021
Syed Muhammad Mohsin, Imran Ali Khan, Syed Muhammad Abrar Akber, Shahaboddin Shamshirband, Anthony T. Chronopoulos
Mutual authentication or two-way authentication is the process that lets the entities involved in communication to verify the originality of each other. Mutual authentication should be provided in a way that it should provide immunity against the man-in-the-middle attack and replay attack [37]. Moreover, the mutual authentication protocol should be efficient. Different types of mutual authentication protocols are proposed by the research community to provide therequired security services for resource-constrained devices [27,37,39–44].