0% Complete
English
صفحه اصلی
/
شانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Secure Mutual Authentication and Key Agreement Protocol for IoT
نویسندگان :
Mostafa Sadeghi
1
1- دانشگاه آزاد اسلامی واحد خوراسگان
کلمات کلیدی :
Internet of Things،Authentication،Key Agreement،Formal Proof،Scyther Tool
چکیده :
Given the rapid growth and development of the Internet of Things and its applications in various sectors of human life, the advantages that this technology has brought to human life are not hidden from anyone. For this reason, many researchers have focused on the Internet of Things and its various applications in various sectors. On the other hand, considering that this technology collects data using sensors and sends it over an insecure platform, such as the Internet, it has raised numerous security concerns. For this reason, ensuring the security and confidentiality of data exchanged in the Internet of Things environment is currently one of the hot topics for researchers. In previous studies, researchers have not been able to provide designs that encompass all security aspects of the Internet of Things platform. For example, previous designs have not been able to resist all known attacks and also meet various security needs, such as perfect forward secrecy. In this regard, this article presents a protocol for authentication and key agreement between Internet of Things entities to ensure the security and confidentiality of data exchanged in this environment. Next, we showed in two formal ways using the Scyther tool and informally that the proposed protocol, in addition to meeting various security needs, is also resistant to known attacks and considers all security aspects of data exchange in the Internet of Things. Finally, the results of the performance evaluation of the proposed protocol indicate that it has a better execution time and introduces less overhead to the system compared to other protocols.
لیست مقالات
لیست مقالات بایگانی شده
Inner and Outer Bearing Fault Diagnosis of electrical Motors Using a Proposed Algorithm and Vibration Signals
Vahid Safari Dehnavi - Masoud Shafiee
تحلیل احساسات نظرات کاربران تجارت الکترونیک با استفاده از تکنیک های یادگیری عمیق
محیا دشتیانه - رضا قاسمی یقین
Energy-Saving for User-Centric Dynamic 5G HetNets Using DRL Method
Erfan Rasti - Mohammad Ali Arami - Abbas Mohammadi
A Data-Efficient Approach to Solar Panel Micro-Crack Detection via Self-Supervised Learning
Alireza Akhavan safaei - Pegah Saboori - Reza Ramezani - Morteza Tavana
Two Novel Designs of Efficient Single-Bit Comparators in QCA Technology with Ultra-Low Energy Dissipation
Shobeir Fayazi - Hatam Abdoli
تخلیهی باری وظایف اینترنت اشیاء بر روی مه محاسباتی با استفاده از الگوریتم حشره آبسوار
عفت تقی زاده بیلندی - آرش دلداری - علیرضا صالحان
قطعه بندی خودکار توده کلیه در تصاویر توموگرافی کامپیوتری با استفاده از همافزایی شبکه عصبی عمیق U-Net و الگوریتم فراابتکاری نهنگ
علی خلیلی - محمد مصلح - محمد خیراندیش
بررسی تأثیر استقرار استاندارد COBIT در افزایش بهره وری سازمانها (مطالعه موردی: شعب نمایندگیهای همراه اول، ایرانسل، رایتل)
دکتر محمد ابراهیم سمیع - ساره رحمانیان محمد ابراهیم سمیع - ساره رحمانیان -
Explainable AI for Medical Image Diagnosis Using Hybrid Attention-CAM Mechanisms
Negin Amirzadeh
تحلیل داده های شهری با رویکرد هوش تجاری
دریا چراغی
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.5.2