0% Complete
فارسی
Home
/
شانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Secure Mutual Authentication and Key Agreement Protocol for IoT
Authors :
Mostafa Sadeghi
1
1- دانشگاه آزاد اسلامی واحد خوراسگان
Keywords :
Internet of Things،Authentication،Key Agreement،Formal Proof،Scyther Tool
Abstract :
Given the rapid growth and development of the Internet of Things and its applications in various sectors of human life, the advantages that this technology has brought to human life are not hidden from anyone. For this reason, many researchers have focused on the Internet of Things and its various applications in various sectors. On the other hand, considering that this technology collects data using sensors and sends it over an insecure platform, such as the Internet, it has raised numerous security concerns. For this reason, ensuring the security and confidentiality of data exchanged in the Internet of Things environment is currently one of the hot topics for researchers. In previous studies, researchers have not been able to provide designs that encompass all security aspects of the Internet of Things platform. For example, previous designs have not been able to resist all known attacks and also meet various security needs, such as perfect forward secrecy. In this regard, this article presents a protocol for authentication and key agreement between Internet of Things entities to ensure the security and confidentiality of data exchanged in this environment. Next, we showed in two formal ways using the Scyther tool and informally that the proposed protocol, in addition to meeting various security needs, is also resistant to known attacks and considers all security aspects of data exchange in the Internet of Things. Finally, the results of the performance evaluation of the proposed protocol indicate that it has a better execution time and introduces less overhead to the system compared to other protocols.
Papers List
List of archived papers
شبکههای نرمافزار محور در کلان داده: مطالعهی راهکارهای امنیتی و چالشها
احسان سلیمانی دهکردی - محمدرضا ملاخلیلی میبدی
طراحی نرم افزاری مبتنی بر واقعیت افزوده با کاربرد فروش عینک
مینا علیانژاد - نسترن زنجانی - زهرا عسکری نژاد امیری
نظرکاوی در سطح مفهوم با استفاده از رویکردی ترکیبی
سیدرضا قادریان خیرآبادی سیدرضا قادریان خیرآبادی -
Ensemble Model Based on an Improved Convolutional Neural Network with a Domain-agnostic Data Augmentation Technique
Faraz Fatahnaie - Armin Azhdehnia - Seyyed Amir Asghari - Mohammadreza Binesh Marvasti
Sparse Beamforming Design for Non-Coherent UD-CRAN with mm-Wave Fronthaul Links
Alireza M. Hosseini - Dr Abbas Mohammadi
هوشمندسازی در صنعت تایر با استفاده از هوش تجاری برای تحلیل و پایش شرایط عملیاتی و شرایط محصول
پوریا عزتی
A Survey on Utilizing Reinforcement Learning in Wireless Sensor Networks Routing Protocols
Ali Forghani Elah Abadi - Seyedeh Elham Asghari - Sepideh Sharifani - Seyyed Amir Asghari - Mohammadreza Binesh Marvasti
Classification and Evaluation of Privacy Preserving Data Mining Methods
Negar Nasiri - Mohammadreza Keyvanpour
A Topic Based Method to Classify the Question Clarity in CQA Networks
Alireza Khabbazan - Dr Ahmad Ali Abin
CRYPTOCURRENCY PRICE PREDICTION USING A HYBRID DEEP MODEL AND TECHNICAL AND PSYCHOLOGICAL INDICATORS
Mohammadreza Borjian - Mohammad Mehdi Homayounpour
more
Samin Hamayesh - Version 42.5.2