메뉴 건너뛰기




Volumn 2, Issue 4, 2017, Pages 359-370

Lightweight Mutual Authentication for IoT and Its Applications

Author keywords

Internet of things; mutual authentication; smart cities

Indexed keywords

AUTHENTICATION; DECISION MAKING; ELECTRIC POWER SYSTEM CONTROL; ELECTRIC POWER TRANSMISSION NETWORKS; PUBLIC KEY CRYPTOGRAPHY; SMART CITY; WATER MANAGEMENT;

EID: 85039783799     PISSN: None     EISSN: 23773782     Source Type: Journal    
DOI: 10.1109/TSUSC.2017.2716953     Document Type: Article
Times cited : (140)

References (40)
  • 3
    • 77949676803 scopus 로고    scopus 로고
    • Key agreement, the Algebraic EraserTM, and lightweight crytography
    • I. Anshel, M. Anshel, D. Goldfeld, and S. Lemieux, "Key agreement, the Algebraic EraserTM, and lightweight crytography," Contemporary Math., vol. 416, no. 2006, pp. 1-34, 2006.
    • (2006) Contemporary Math. , vol.416 , Issue.2006 , pp. 1-34
    • Anshel, I.1    Anshel, M.2    Goldfeld, D.3    Lemieux, S.4
  • 4
    • 0000942205 scopus 로고
    • Theory of braids
    • E. Artin, "Theory of braids," Ann. Math., vol. 48, pp. 101-126, 1947.
    • (1947) Ann. Math. , vol.48 , pp. 101-126
    • Artin, E.1
  • 5
    • 85081706597 scopus 로고    scopus 로고
    • Security in low resource environments, 2006. [Online]. Available: http://www.securerf.com/wp-content/uploads/2014/03/White-Paper-Security-in-Low-Resource-Environments.pdf
    • (2006) Security in Low Resource Environments
  • 8
    • 49049105964 scopus 로고    scopus 로고
    • EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol
    • Y. K. Lee, L. Batina, and I. Verbauwhede, "EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol," in Proc. IEEE Int. Conf. RFID, 2008, pp. 97-104.
    • (2008) Proc. IEEE Int. Conf. RFID , pp. 97-104
    • Lee, Y.K.1    Batina, L.2    Verbauwhede, I.3
  • 10
    • 70349268101 scopus 로고    scopus 로고
    • Untraceable RFID authentication protocols: Revision of EC-RAC
    • Y. K. Lee, L. Batina, and I. Verbauwhede, "Untraceable RFID authentication protocols: Revision of EC-RAC," in Proc. IEEE Int. Conf. RFID, 2009, pp. 178-185.
    • (2009) Proc. IEEE Int. Conf. RFID , pp. 178-185
    • Lee, Y.K.1    Batina, L.2    Verbauwhede, I.3
  • 11
    • 84908530088 scopus 로고    scopus 로고
    • Proper RFID privacy: Model and protocols
    • Dec.
    • J. Hermans, R. Peeters, and B. Preneel, "Proper RFID privacy: Model and protocols," IEEE Trans. Mobile Comput., vol. 13, no. 12, pp. 2888-2902, Dec. 2014.
    • (2014) IEEE Trans. Mobile Comput. , vol.13 , Issue.12 , pp. 2888-2902
    • Hermans, J.1    Peeters, R.2    Preneel, B.3
  • 19
    • 84861596547 scopus 로고    scopus 로고
    • Short expressions of permutations as products and pryptanalysis of the algebraic eraser
    • A. Kalka, M. Teicher, and B. Tsaban, "Short expressions of permutations as products and pryptanalysis of the algebraic eraser," Advances Appl. Math., vol. 49, no. 1, pp. 57-76, 2012.
    • (2012) Advances Appl. Math. , vol.49 , Issue.1 , pp. 57-76
    • Kalka, A.1    Teicher, M.2    Tsaban, B.3
  • 21
    • 84977543186 scopus 로고    scopus 로고
    • On the security of the Algebraic Eraser tag authentication protocol
    • M. Manulis, A. Sadeghi, and S. Schneider, Eds., Guildford, UK, Springer, Jun.
    • S. R. Blackburn and M. J. B. Robshaw, "On the security of the Algebraic Eraser tag authentication protocol," Appl. Cryptography Netw. Security-14th Int. Conf., ACNS 2016, Proc., ser. LNCS, M. Manulis, A. Sadeghi, and S. Schneider, Eds., Guildford, UK, Springer, vol. 9696, pp. 3-17, Jun. 2016.
    • (2016) Appl. Cryptography Netw. Security-14th Int. Conf., ACNS 2016, Proc., Ser. LNCS , vol.9696 , pp. 3-17
    • Blackburn, S.R.1    Robshaw, M.J.B.2
  • 22
    • 85081709375 scopus 로고    scopus 로고
    • Defeating the Ben-Zvi, Blackburn, and Tsaban attack on the algebraic eraser
    • vol. abs/1601.04780
    • I. Anshel, D. Atkins, D. Goldfeld, and P. E. Gunnells, "Defeating the Ben-Zvi, Blackburn, and Tsaban attack on the algebraic eraser," CoRR, vol. abs/1601.04780, 2016. [Online]. Available: http://arxiv.org/abs/1601.04780
    • (2016) CoRR
    • Anshel, I.1    Atkins, D.2    Goldfeld, D.3    Gunnells, P.E.4
  • 23
    • 85081709154 scopus 로고    scopus 로고
    • Defeating the kalka-teicher-tsaban linear algebra attack on the algebraic eraser
    • vol. abs/1202.0598
    • D. Goldfeld and P. E. Gunnells, "Defeating the kalka-teicher-tsaban linear algebra attack on the algebraic eraser," CoRR, vol. abs/1202.0598, 2012. [Online].Available: http://arxiv.org/abs/1202.0598
    • (2012) CoRR
    • Goldfeld, D.1    Gunnells, P.E.2
  • 25
    • 85081708896 scopus 로고    scopus 로고
    • IEEE P1363, (2008). [Online]. Available: http://grouper.ieee.org/groups/1363/
    • (2008) IEEE P1363
  • 28
    • 85081706080 scopus 로고    scopus 로고
    • IBIHOP: Proper privacy preserving mutual RFID authentication
    • R. Peeters, J. Hermans, and J. Fan, "IBIHOP: Proper privacy preserving mutual RFID authentication," in Proc. Workshop RFID IoT Secur., 2013, pp. 3-16.
    • (2013) Proc. Workshop RFID IoT Secur. , pp. 3-16
    • Peeters, R.1    Hermans, J.2    Fan, J.3
  • 30
    • 84954429881 scopus 로고    scopus 로고
    • An elliptic curve cryptography-based RFID authentication securing E-health system
    • 642425
    • C.-I. Lee and H.-Y. Chien, "An elliptic curve cryptography-based RFID authentication securing E-health system," Int. J. Distrib. Sensor Netw., vol. 2015, no. 642425, pp. 109-126, 2015.
    • (2015) Int. J. Distrib. Sensor Netw. , vol.2015 , pp. 109-126
    • Lee, C.-I.1    Chien, H.-Y.2
  • 31
    • 84981703916 scopus 로고    scopus 로고
    • Efficient identity authentication and encryption technique for high throughput RFID system
    • C. Hsu, S. Wang, D. Zhang, H. Chu, and N. Lu, "Efficient identity authentication and encryption technique for high throughput RFID system," Secur. Commun. Netw., vol. 9, no. 15, pp. 2581-2591, 2016.
    • (2016) Secur. Commun. Netw. , vol.9 , Issue.15 , pp. 2581-2591
    • Hsu, C.1    Wang, S.2    Zhang, D.3    Chu, H.4    Lu, N.5
  • 32
    • 84949032526 scopus 로고    scopus 로고
    • Offloading mobile data traffic for QoS-aware service provision in vehicular cyber-physical systems
    • S. Wang, T. Lei, L. Zhang, C. Hsu, and F. Yang, "Offloading mobile data traffic for QoS-aware service provision in vehicular cyber-physical systems," Future Generation Comput. Syst., vol. 61, pp. 118-127, 2016.
    • (2016) Future Generation Comput. Syst. , vol.61 , pp. 118-127
    • Wang, S.1    Lei, T.2    Zhang, L.3    Hsu, C.4    Yang, F.5
  • 33
    • 84895134059 scopus 로고    scopus 로고
    • A vertical handoff method via self-selection decision tree for internet of vehicles
    • Sep.
    • S. Wang, C. Fan, C. Hsu, Q. Sun, and F. Yang, "A vertical handoff method via self-selection decision tree for internet of vehicles," IEEE Syst. J., vol. 10, no. 3, pp. 1183-1192, Sep. 2016.
    • (2016) IEEE Syst. J. , vol.10 , Issue.3 , pp. 1183-1192
    • Wang, S.1    Fan, C.2    Hsu, C.3    Sun, Q.4    Yang, F.5
  • 34
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. M. Needham and M. D. Schroeder, "Using encryption for authentication in large networks of computers," Commun. ACM, vol. 21, no. 12, pp. 993-999, 1978.
    • (1978) Commun ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 35
    • 28144456308 scopus 로고
    • An attack on the needham-schroeder public-key authentication protocol
    • G. Lowe, "An attack on the needham-schroeder public-key authentication protocol," Inf. Process. Lett., vol. 56, no. 3, pp. 131-133, 1995.
    • (1995) Inf. Process. Lett. , vol.56 , Issue.3 , pp. 131-133
    • Lowe, G.1
  • 36
    • 33745571012 scopus 로고    scopus 로고
    • On lattices, learning with errors random linear codes, and cryptography
    • O. Regev, "On lattices, learning with errors, random linear codes, and cryptography," in Proc. 37th Annu. ACM Symp. Theory Comput., 2005, pp. 84-93.
    • (2005) Proc. 37th Annu. ACM Symp. Theory Comput. , pp. 84-93
    • Regev, O.1
  • 37
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Mar
    • D. Dolev and A. Yao, "On the security of public key protocols," IEEE Trans. Inf. Theory, vol. 29, no. 2, pp. 198-208, Mar. 1983.
    • (1983) IEEE Trans. Inf. Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.