期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Lightweight authentication scheme for edge control systems in Industrial Internet of Things 被引量:1
1
作者 Wenli SHANG Xudong WEN +3 位作者 Zhuo CHEN Wenze XIONG Zhiwei CHANG Zhong CAO 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2024年第11期1466-1478,共13页
In edge control systems(ECSs),edge computing demands more local data processing power,while traditional industrial programmable logic controllers(PLCs)cannot meet this demand.Thus,edge intelligent controllers(EICs)hav... In edge control systems(ECSs),edge computing demands more local data processing power,while traditional industrial programmable logic controllers(PLCs)cannot meet this demand.Thus,edge intelligent controllers(EICs)have been developed,making their secure and reliable operation crucial.However,as EICs communicate sensitive information with resource-limited terminal devices(TDs),a low-cost,efficient authentication solution is urgently needed since it is challenging to implement traditional asymmetric cryptography on TDs.In this paper,we design a lightweight authentication scheme for ECSs using low-computational-cost hash functions and exclusive OR(XOR)operations;this scheme can achieve bidirectional anonymous authentication and key agreement between the EIC and TDs to protect the privacy of the devices.Through security analysis,we demonstrate that the authentication scheme can provide the necessary security features and resist major known attacks.Performance analysis and comparisons indicate that the proposed authentication scheme is effective and feasible for deployment in ECSs. 展开更多
关键词 Edge intelligent controller(EIC) Edge control systems(ECSs) Terminal devices(TDs) Anonymous authentication lightweight authentication
原文传递
Secured Cloud Communication Using Lightweight Hash Authentication with PUF
2
作者 R.Padmavathy M.Newlin Rajkumar 《Computer Systems Science & Engineering》 SCIE EI 2022年第10期233-243,共11页
Internet-of-Things(IoT)is an awaited technology in real-world applications to process daily tasks using intelligent techniques.The main process of data in IoT involves communication,integration,and coordination with o... Internet-of-Things(IoT)is an awaited technology in real-world applications to process daily tasks using intelligent techniques.The main process of data in IoT involves communication,integration,and coordination with other real-world applications.The security of transferred,stored,and processed data in IoT is not ensured in many constraints.Internet-enabled smart devices are widely used among populations for all types of applications,thus increasing the popularity of IoT among widely used server technologies.Smart grid is used in this article with IoT to manage large data.A smart grid is a collection of numerous users in the network with the fastest response time.This article aims to provide high authentication to the smart grid,which constitutes secure communication in cloud-based IoT.Many IoT devices are deployed openly in all places.This open-access is vulnerable toward cloning attacks.Authentication is a significant process that provides strength while attacking.The security of the cloud and IoT must be computationally high.A lightweight authentication using hashing technique is proposed considering the aforementioned condition.The main factor of the authentication involves physically unclonable functions,which are utilized in improving the performance of the authentication.The proposed approach is evaluated with the existing techniques.Results show that the performance of the proposed algorithm provides high robust security. 展开更多
关键词 CLOUD IOT smart grid PUF lightweight authentication
在线阅读 下载PDF
Toward an RSU-unavailable Lightweight Certificateless Key Agreement Scheme for VANETs 被引量:5
3
作者 SONG Jun HE Chunjiao +2 位作者 ZHANG Lei TANG Shanyu ZHANG Huanguo 《China Communications》 SCIE CSCD 2014年第9期93-103,共11页
Vehicle ad-hoc networks have developed rapidly these years,whose security and privacy issues are always concerned widely.In spite of a remarkable research on their security solutions,but in which there still lacks con... Vehicle ad-hoc networks have developed rapidly these years,whose security and privacy issues are always concerned widely.In spite of a remarkable research on their security solutions,but in which there still lacks considerations on how to secure vehicleto-vehicle communications,particularly when infrastructure is unavailable.In this paper,we propose a lightweight certificateless and oneround key agreement scheme without pairing,and further prove the security of the proposed scheme in the random oracle model.The proposed scheme is expected to not only resist known attacks with less computation cost,but also as an efficient way to relieve the workload of vehicle-to-vehicle authentication,especially in no available infrastructure circumstance.A comprehensive evaluation,including security analysis,efficiency analysis and simulation evaluation,is presented to confirm the security and feasibility of the proposed scheme. 展开更多
关键词 vehicle ad-hoc network securityand privacy lightweight authentication certificateless key agreement
在线阅读 下载PDF
Modified Vanstone’s Construction of lightweight MAC for Vehicular On-Board IT Systems
4
作者 István Vajda 《Journal of Computer and Communications》 2020年第12期214-230,共17页
We propose a lightweight construction, a modification of Vanstone’s MAC construction, for the message authentication of the communication between Electronic Control Units (ECUs) in distributed car control systems. Th... We propose a lightweight construction, a modification of Vanstone’s MAC construction, for the message authentication of the communication between Electronic Control Units (ECUs) in distributed car control systems. The proposed approach can solve the task of error control and authentication in unified algorithmic technology, called MAC (Message Authentication Code) with ECC (Error Correction Code). We follow a provable approach in the design of the cryptographic primitive, where we quantify the security measures in the parameters of the system. Provable security approaches are missing in the field of secure in-vehicle communication. 展开更多
关键词 Secure in-Vehicle Communication lightweight authentication MAC with Error Correction Capability Provable Security
在线阅读 下载PDF
Novel Sequence Number Based Secure Authentication Scheme for Wireless LANs
5
作者 Rajeev Singh Teek Parval Sharma 《Journal of Electronic Science and Technology》 CAS CSCD 2015年第2期144-152,共9页
Authentication per frame is an implicit necessity for security in wireless local area networks(WLANs). We propose a novel per frame secure authentication scheme which provides authentication to data frames in WLANs.... Authentication per frame is an implicit necessity for security in wireless local area networks(WLANs). We propose a novel per frame secure authentication scheme which provides authentication to data frames in WLANs. The scheme involves no cryptographic overheads for authentication of frames.It utilizes the sequence number of the frame along with the authentication stream generators for authentication.Hence, it requires no extra bits or messages for the authentication purpose and also no change in the existing frame format is required. The scheme provides authentication by modifying the sequence number of the frame at the sender, and that the modification is verified at the receiver. The modified sequence number is protected by using the XOR operation with a random number selected from the random stream. The authentication is lightweight due to the fact that it requires only trivial arithmetic operations like the subtraction and XOR operation. 展开更多
关键词 authentication authentication frames receiver verified lightweight operations cryptographic encryption sender
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部