network authentication
Recently Published Documents


TOTAL DOCUMENTS

83
(FIVE YEARS 13)

H-INDEX

9
(FIVE YEARS 1)

2021 ◽  
Author(s):  
Huimin Chen ◽  
Hengyue Jia ◽  
Xia Wu ◽  
Xiuli Wang ◽  
Maoning Wang

2021 ◽  
Author(s):  
Abdulrahman Bin Rabiah ◽  
Yugarshi Shashwat ◽  
Fatemah Alharbi ◽  
Silas Richelson ◽  
Nael Abu-Ghazaleh

2021 ◽  
pp. 232-239
Author(s):  
Muntasser S. Falih ◽  
Fatima B. Ibrahim ◽  
Mahmood K. Ibrahem

In this paper an authentication based finger print biometric system is proposed with personal identity information of name and birthday. A generation of National Identification Number (NIDN) is proposed in merging of finger print features and the personal identity information to generate the Quick Response code (QR) image that used in access system. In this paper two approaches are dependent, traditional authentication and strong identification with QR and NIDN information. The system shows accuracy of 96.153% with threshold value of 50. The accuracy reaches to 100% when the threshold value goes under 50.


2021 ◽  
Vol 336 ◽  
pp. 08009
Author(s):  
Yili Lu

This article introduces the security risks of the commonly used MQTT protocol in the Internet of Things and the security risks caused by smart door lock vulnerabilities, aiming to solve the problem of public MQTT agent leaking smart lock data, causing attackers to use the sensitive data to physically locate and remotely control the connection to the smart door lock supplier Any lock issues in the cloud infrastructure. This paper presents a wireless sensor network authentication encryption method based on SM9 algorithm. By implementing and deploying sensor network authentication encryption in practical applications, it avoids the leakage of sensitive information from public data exposed on the Internet.


Sensors ◽  
2020 ◽  
Vol 20 (4) ◽  
pp. 1062
Author(s):  
Yongle Chen ◽  
Xiaojian Wang ◽  
Yuli Yang ◽  
Hong Li

Advanced wireless technology in Internet of Things (IoT) devices is increasing and facing various security threats. The authentication of IoT devices is the first line of defense for the wireless network. Especially in a Wi-Fi network, the existing authentication methods mainly use a password or digital certificate, these methods are inconvenient to manage due to certificate issuance or prone to be attacked because passwords are easily cracked. In this paper, we propose a location-aware authentication scheme using smart contracts to ensure that IoT devices can securely perform Wi-Fi network authentication. The scheme adopts the concept of secondary authentication and consists of two phases: the registration phase, which is mainly designed to complete the generation of the public and private keys, and to link the device information with its related device information; the authentication phase, which is mainly designed to determine whether the requesting device is within a legal location range. We use the smart contract to ensure the credibility and irreparability of the authentication process. Analysis of the attack model and the attacks at different stages proves that this certification scheme is assured, and the simulation results show that the overhead introduced by this scheme is acceptable, this scheme can provide greater security for the Wi-Fi authentication of IoT devices.


Sign in / Sign up

Export Citation Format

Share Document