期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
基于智能卡的多服务器远程匿名认证密钥协商协议 被引量:7
1
作者 李艳平 刘小雪 +1 位作者 屈娟 鲁来凤 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2016年第1期91-98,共8页
针对Xu等近期提出的一个基于智能卡的动态身份用户远程认证方案(简称XJWM)进行分析,指出其不能抵抗冒充攻击和密钥泄露攻击,且不能实现前向安全和后向安全。利用Diffie-Hellman密钥协商算法及生物认证技术,提出一个新的多服务器环境下... 针对Xu等近期提出的一个基于智能卡的动态身份用户远程认证方案(简称XJWM)进行分析,指出其不能抵抗冒充攻击和密钥泄露攻击,且不能实现前向安全和后向安全。利用Diffie-Hellman密钥协商算法及生物认证技术,提出一个新的多服务器环境下多因子远程匿名认证密钥协商协议。新方案不仅有效弥补了XJWM方案存在的安全缺陷,而且增加了智能卡对持卡者的口令与生物信息的认证,避免了智能卡丢失引起的冒充攻击。最后,用改进的BAN逻辑证明了新方案密钥协商的正确性、会话密钥机密性与新鲜性以及双向认证性。安全性和性能分析说明,新方案在少量增加计算量的情况下具有良好的安全性。 展开更多
关键词 智能卡 密钥协商 匿名认证 burrows-abadi-needham(BAN)逻辑
下载PDF
Cogent and Energy Efficient Authentication Protocol for WSN in IoT 被引量:2
2
作者 Tariq Mahmood Butt Rabia Riaz +2 位作者 Chinmay Chakraborty Sanam Shahla Rizvi Anand Paul 《Computers, Materials & Continua》 SCIE EI 2021年第8期1877-1898,共22页
Given the accelerating development of Internet of things(IoT),a secure and robust authentication mechanism is urgently required as a critical architectural component.The IoT has improved the quality of everyday life f... Given the accelerating development of Internet of things(IoT),a secure and robust authentication mechanism is urgently required as a critical architectural component.The IoT has improved the quality of everyday life for numerous people in many ways.Owing to the predominantly wireless nature of the IoT,connected devices are more vulnerable to security threats compared to wired networks.User authentication is thus of utmost importance in terms of security on the IoT.Several authentication protocols have been proposed in recent years,but most prior schemes do not provide sufficient security for these wireless networks.To overcome the limitations of previous schemes,we propose an efficient and lightweight authentication scheme called the Cogent Biometric-Based Authentication Scheme(COBBAS).The proposed scheme is based on biometric data,and uses lightweight operations to enhance the efficiency of the network in terms of time,storage,and battery consumption.A formal security analysis of COBBAS using Burrows–Abadi–Needham logic proves that the proposed protocol provides secure mutual authentication.Formal security verification using the Automated Validation of Internet Security Protocols and Applications tool shows that the proposed protocol is safe against man-in-the-middle and replay attacks.Informal security analysis further shows that COBBAS protects wireless sensor networks against several security attacks such as password guessing,impersonation,stolen verifier attacks,denial-of-service attacks,and errors in biometric recognition.This protocol also provides user anonymity,confidentiality,integrity,and biometric recovery in acceptable time with reasonable computational cost. 展开更多
关键词 Internet of things wireless sensor networks AUTHENTICATION burrows-abadi-needham logic fuzzy extractor elliptic curve cryptography
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部