A Replay-Attack Resistant Authentication Scheme for the Internet of Things

Author(s):  
Yuxiang Feng ◽  
Wenhao Wang ◽  
Yukai Weng ◽  
Huanming Zhang
Electronics ◽  
2020 ◽  
Vol 9 (4) ◽  
pp. 634 ◽  
Author(s):  
Xudong Jia ◽  
Ning Hu ◽  
Shen Su ◽  
Shi Yin ◽  
Yan Zhao ◽  
...  

The incredible development of Internet of things technology promotes the integration of application systems, which enable people to enjoy the convenience of multiple application services through a single intelligent device or terminal. In order to implement value exchange and information sharing between different applications, cross-domain access is inevitable. In order to prevent illegal access, identity authentication is necessary before the terminal accesses the service. Because of the need to introduce a trusted third party, the traditional centralized authentication model not only destroys the autonomy and flexibility of the application system, but also causes issues such as single point of failure and hidden dangers of unilateral control. This paper proposes an identity-based cross-domain authentication scheme for the Internet of Things. This scheme uses the Blockchain as a decentralized trust anchor instead of the traditional certificate of authority, and uses the identity-based self-authentication algorithm to replace the traditional PKI authentication algorithm. The scheme proposed in this paper implements a decentralized authentication model, which can guarantee the autonomy and initiative of the security domain.


2013 ◽  
Vol 411-414 ◽  
pp. 619-624
Author(s):  
Jing Zhong ◽  
Wei Liu ◽  
Ying Kai Wang

By analyzing the security threats faced during the process of Internet data transfer, this paper compares the existing three security schemes, points out their limits and proposes a secure transfer protocol. This protocol can provide data confidentiality protection, data integrity protection, protection against replay attack and non-repudiation protection by ensuring the identities of both communication sides, and thus it ensures the security of data transmission of the Internet of things. This paper first introduces the overall framework of the protocol, then it elaborates the connection establishment and release process, data exchange process, key exchange process, finally it proves the feasibility of the protocol by the experiments.


Sign in / Sign up

Export Citation Format

Share Document