版权说明 操作指南
首页 > 成果 > 详情

Deeper Insight Into Why Authentication Schemes in IoT Environments Fail to Achieve the Desired Security

认领
导出
Link by DOI
反馈
分享
QQ微信 微博
成果类型:
期刊论文
作者:
Guo, Yimin;Guo, Yajun;Xiong, Ping;Yang, Fan;Zhang, Chengde
通讯作者:
Guo, YM
作者机构:
[Guo, Yimin; Zhang, Chengde; Guo, YM; Yang, Fan; Xiong, Ping] Zhongnan Univ Econ & Law, Sch Informat & Secur Engn, Wuhan 430073, Peoples R China.
[Guo, Yajun] Cent China Normal Univ, Sch Comp, Wuhan 430079, Peoples R China.
通讯机构:
[Guo, YM ] Z
Zhongnan Univ Econ & Law, Sch Informat & Secur Engn, Wuhan 430073, Peoples R China.
语种:
英文
关键词:
Authentication;explicit attack;implicit attack;security;Internet of Things (IoT)
期刊:
IEEE Transactions on Information Forensics and Security
ISSN:
1556-6013
年:
2024
卷:
19
页码:
4615-4627
基金类别:
the Graduate Education Reform Project, Zhongnan University of Economics and Law#&#&#YJ20230043 National Social Science Fund of China#&#&#22BXW081 the Humanities and Social Sciences Research Project of Chinese Ministry of Education#&#&#19YJCZH214#&#&#22YJCZH217 "the Fundamental Research Funds for the Central Universities", Zhongnan University of Economics and Law#&#&#2722024BY022 National Natural Science Foundation of China#&#&#62102453
机构署名:
本校为其他机构
院系归属:
计算机学院
摘要:
Designing an efficient and secure authentication scheme is a significant means to ensure the security of IoT systems. Hundreds of authentication schemes tailored for IoT environments have been proposed in recent years, and regrettably, many of them were soon found to have succumbed to security vulnerabilities. In an effort to investigate the underlying reason for this, Wang et al. (at TIFS'23) recently analyzed the vulnerability of authentication schemes from the perspective of provable security. However, we observe that some authentication schemes with sound security proofs and heuristic secu...

反馈

验证码:
看不清楚,换一个
确定
取消

成果认领

标题:
用户 作者 通讯作者
请选择
请选择
确定
取消

提示

该栏目需要登录且有访问权限才可以访问

如果您有访问权限,请直接 登录访问

如果您没有访问权限,请联系管理员申请开通

管理员联系邮箱:yun@hnwdkj.com