透過您的圖書館登入
IP:18.191.29.151
  • 期刊
  • Ahead-of-Print

WSN Integrated Authentication Schemes Based on Internet of Things

本篇文章尚未正式出版,請點選「收藏」跟進後續出版資訊!

摘要


The leader of the new generation of technology, namely the Internet of Things (IoT), is now already an indispensable part of many people's lives. In this research, we have analyzed the main communication models of IoT in terms of functional conformity and classified those models into two kinds. Then, for each of the two kinds, we have developed a new generalized model that is applicable in practically every possible case. Our first new model is to be applied in most common network environments where users directly connect to the authentication server, whereas the second new model is most applicable when users connect to some specified devices instead of a server. Besides the couple of new communication models we have just developed, in this paper we shall also present some integrated security authentication schemes that we have designed. Through some thorough security analyses, we have proven that our new schemes can resist a collection of attacks including the replay attack, privileged insider attack, stolen verifier attack, stolen smart card and smart card breach attack, impersonation, as well as the offline password guessing attack. In addition to the high security level, our new schemes also provide user anonymity with the communication efficiency unaffected by the security protection. On top of everything, our major concern and contribution is for every member of the worldwide IoT user community to enjoy the conveniences the industry 4.0 technologies bring without loss of privacy and personal interests.

延伸閱讀