国产bbaaaaa片,成年美女黄网站色视频免费,成年黄大片,а天堂中文最新一区二区三区,成人精品视频一区二区三区尤物

首頁(yè)> 美國(guó)衛(wèi)生研究院文獻(xiàn)>Sensors (Basel Switzerland) >Cryptanalysis and Improvement of a Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks
【2h】

Cryptanalysis and Improvement of a Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks

機(jī)譯:無(wú)線傳感器網(wǎng)絡(luò)的隱私保護(hù)三要素認(rèn)證協(xié)議的密碼分析和改進(jìn)

代理獲取
本網(wǎng)站僅為用戶提供外文OA文獻(xiàn)查詢(xún)和代理獲取服務(wù),本網(wǎng)站沒(méi)有原文。下單后我們將采用程序或人工為您竭誠(chéng)獲取高質(zhì)量的原文,但由于OA文獻(xiàn)來(lái)源多樣且變更頻繁,仍可能出現(xiàn)獲取不到、文獻(xiàn)不完整或與標(biāo)題不符等情況,如果獲取不到我們將提供退款服務(wù)。請(qǐng)知悉。

摘要

Wireless sensor networks (WSNs) are of prominent use in unmanned surveillance applications. This peculiar trait of WSNs is actually the underlying technology of various applications of the Internet of Things (IoT) such as smart homes, smart cities, smart shopping complexes, smart traffic, smart health, and much more. Over time, WSNs have evolved as a strong base for laying the foundations of IoT infrastructure. In order to address the scenario in which a user wants to access the real-time data directly from the sensor node in wireless sensor networks (WSNs), Das recently proposed an anonymity-preserving three-factor authentication protocol. Das’s protocol is suitable for resource-constrained sensor nodes because it only uses lightweight cryptographic primitives such as hash functions and symmetric encryption schemes as building blocks. Das’s protocol is claimed to be secure against different known attacks by providing formal security proof and security verification using the Automated Validation of Internet Security Protocols and Applications tool. However, we find that Das’s protocol has the following security loopholes: (1) By using a captured sensor node, an adversary can impersonate a legal user to the gateway node, impersonate other sensor nodes to deceive the user, and the adversary can also decrypt all the cipher-texts of the user; (2) the gateway node has a heavy computational cost due to user anonymity and thus the protocol is vulnerable to denial of service (DoS) attacks. We overcome the shortcomings of Das’s protocol and propose an improved protocol. We also prove the security of the proposed protocol in the random oracle model. Compared with the other related protocols, the improved protocol enjoys better functionality without much enhancement in the computation and communication costs. Consequently, it is more suitable for applications in WSNs
機(jī)譯:無(wú)線傳感器網(wǎng)絡(luò)(WSN)在無(wú)人監(jiān)視應(yīng)用中占有重要的地位。 WSN的這一獨(dú)特特性實(shí)際上是物聯(lián)網(wǎng)(IoT)各種應(yīng)用程序的基礎(chǔ)技術(shù),例如智能家居,智能城市,智能購(gòu)物區(qū),智能交通,智能健康等等。隨著時(shí)間的流逝,無(wú)線傳感器網(wǎng)絡(luò)已經(jīng)成為奠定物聯(lián)網(wǎng)基礎(chǔ)設(shè)施基礎(chǔ)的強(qiáng)大基礎(chǔ)。為了解決用戶想要直接從無(wú)線傳感器網(wǎng)絡(luò)(WSN)中的傳感器節(jié)點(diǎn)訪問(wèn)實(shí)時(shí)數(shù)據(jù)的場(chǎng)景,Das最近提出了一種保留匿名的三要素身份驗(yàn)證協(xié)議。 Das的協(xié)議僅適用于資源受限的傳感器節(jié)點(diǎn),因?yàn)樗鼉H使用輕量級(jí)的加密原語(yǔ)(例如哈希函數(shù)和對(duì)稱(chēng)加密方案)作為構(gòu)建塊。通過(guò)使用Internet安全協(xié)議和應(yīng)用程序的自動(dòng)驗(yàn)證工具提供正式的安全性證明和安全性驗(yàn)證,Das的協(xié)議可以抵御各種已知的攻擊。但是,我們發(fā)現(xiàn)Das協(xié)議具有以下安全漏洞:(1)通過(guò)使用捕獲的傳感器節(jié)點(diǎn),攻擊者可以將合法用戶模擬到網(wǎng)關(guān)節(jié)點(diǎn),模擬其他傳感器節(jié)點(diǎn)來(lái)欺騙用戶,并且攻擊者還可以解密用戶的所有密文; (2)網(wǎng)關(guān)節(jié)點(diǎn)由于用戶匿名而具有沉重的計(jì)算成本,因此該協(xié)議容易受到拒絕服務(wù)(DoS)攻擊。我們克服了Das協(xié)議的缺點(diǎn),并提出了一種改進(jìn)的協(xié)議。我們還在隨機(jī)預(yù)言模型中證明了所提出協(xié)議的安全性。與其他相關(guān)協(xié)議相比,改進(jìn)后的協(xié)議在不增加計(jì)算和通信成本的情況下享有更好的功能。因此,它更適合于WSN中的應(yīng)用

著錄項(xiàng)

相似文獻(xiàn)

  • 外文文獻(xiàn)
  • 中文文獻(xiàn)
  • 專(zhuān)利
代理獲取

客服郵箱:kefu@zhangqiaokeyan.com

京公網(wǎng)安備:11010802029741號(hào) ICP備案號(hào):京ICP備15016152號(hào)-6 六維聯(lián)合信息科技 (北京) 有限公司?版權(quán)所有
  • 客服微信

  • 服務(wù)號(hào)