0% Complete
فارسی
Home
/
شانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Secure Mutual Authentication and Key Agreement Protocol for IoT
Authors :
Mostafa Sadeghi
1
1- دانشگاه آزاد اسلامی واحد خوراسگان
Keywords :
Internet of Things،Authentication،Key Agreement،Formal Proof،Scyther Tool
Abstract :
Given the rapid growth and development of the Internet of Things and its applications in various sectors of human life, the advantages that this technology has brought to human life are not hidden from anyone. For this reason, many researchers have focused on the Internet of Things and its various applications in various sectors. On the other hand, considering that this technology collects data using sensors and sends it over an insecure platform, such as the Internet, it has raised numerous security concerns. For this reason, ensuring the security and confidentiality of data exchanged in the Internet of Things environment is currently one of the hot topics for researchers. In previous studies, researchers have not been able to provide designs that encompass all security aspects of the Internet of Things platform. For example, previous designs have not been able to resist all known attacks and also meet various security needs, such as perfect forward secrecy. In this regard, this article presents a protocol for authentication and key agreement between Internet of Things entities to ensure the security and confidentiality of data exchanged in this environment. Next, we showed in two formal ways using the Scyther tool and informally that the proposed protocol, in addition to meeting various security needs, is also resistant to known attacks and considers all security aspects of data exchange in the Internet of Things. Finally, the results of the performance evaluation of the proposed protocol indicate that it has a better execution time and introduces less overhead to the system compared to other protocols.
Papers List
List of archived papers
استخراج ویژگی مجموعه دادههای پزشکی دارای ابعاد بالا با استفاده از برنامه نویسی ژنتیک چند منظوره
سحر فقیهی راد - دکتر سیده نفیسه آل محمد سحر فقیهی راد - سیده نفیسه آل محمد -
Vi-Net: A Deep Violent Flow Network for Violence Detection in Video Sequences
Tahereh Zarrat Ehsan - Seyed Mehdi Mohtavipour
چارچوب بومی پیادهسازی حکمرانی داده در رسانههای عمومی بر پایه مدل EDM
مریم فتحی - عبدالله امیرخانی - فرشید بهجت محمدی - ملیحه حاجی حسینی
Hardware Imperfection Effects in Wireless Virtual Reality System with Hybrid Beamforming
Nasim Alikhani - Abbas Mohammadi
Enhancing Persian Speech Emotion Recognition with Contrastive Learning and Multimodal Fusion
Mobina Esmaeili - Vajiheh Sabeti
Sentiment Analysis of the Amazon Customers Using the BiGRU Neural Network Enhanced by Attention Mechanism
Sara Sinan Salman al-Abedi - Keyvan Mohebbi
طراحی و پیاده سازی بستر اجرای بازی جنگ سایبری
مریم نصراصفهانی - بهروز ترک لادانی - بهروز شاهقلی قهفرخی - حسین قجاوند بلتیجه - نوید شیرمحمدی - مهدی شمس - محمدامین آقاکبیری
تشخیص زودهنگام سندروم داون از روی تصاویر سونوگرافی جنین با استفاده از مدلهای عمیق پیشآموزش دیده
فائزه سادات حسینی نیا - محرم منصوری زاده - حسن ختنلو
Knowledge gap extraction based on the learner click behavior in interaction with videos using the association rule algorithm
Yosra Bahrani - Omid Fatemi
بکارگیری الگوریتم بهینه سازی فاخته و منطق فازی به منظور بهبود زمانبندی وظایف در محیط محاسبات مه
فاطمه دوامی - حمید جلیلوند - فاطمه نجفی
more
Samin Hamayesh - Version 42.5.2