To see the other types of publications on this topic, follow the link: Lightweight protocol.

Journal articles on the topic 'Lightweight protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Lightweight protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Tsai, Chia-Wei, Chun-Wei Yang, and Narn-Yih Lee. "Lightweight mediated semi-quantum key distribution protocol." Modern Physics Letters A 34, no. 34 (2019): 1950281. http://dx.doi.org/10.1142/s021773231950281x.

Full text
Abstract:
Classical users can share a secret key with a quantum user by using a semi-quantum key distribution (SQKD) protocol. Allowing two classical users to share a secret key is the objective of the mediated semi-quantum key distribution (MSQKD) protocol. However, the existing MSQKD protocols need a quantum user to assist two classical users in distributing the secret keys, and these protocols require that the classical users be equipped with a Trojan horse photon detector. This reduces the practicability of the MSQKD protocols. Therefore, in this study we propose a lightweight MSQKD, in which the two participants and third party are classical users. Due to the usage of the one-way transmission strategy, the proposed lightweight MSQKD protocol is free from quantum Trojan horse attack. The proposed MSQKD is more practical than the existing MSQKD protocols.
APA, Harvard, Vancouver, ISO, and other styles
2

Wu, Yongdong, and Hweehua Pang. "A Lightweight Buyer-Seller Watermarking Protocol." Advances in Multimedia 2008 (2008): 1–7. http://dx.doi.org/10.1155/2008/905065.

Full text
Abstract:
The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001) and C.-L. Lei et al. (2004)) have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours isntimes faster in terms of computation, wherenis the number of watermark elements, while incurring onlyO(1/lN)times communication overhead given the finite field parameterlN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.
APA, Harvard, Vancouver, ISO, and other styles
3

Gódor, Gyozo, and Sándor Imre. "Simple Lightweight Authentication Protocol." International Journal of Business Data Communications and Networking 6, no. 3 (2010): 66–94. http://dx.doi.org/10.4018/jbdcn.2010070104.

Full text
Abstract:
Radio frequency identification technology is becoming ubiquitous and, as a side effect, more authentication solutions come to light, which include numerous security issues. The authors’ have previously introduced a solely hash-based secure authentication algorithm that is capable of providing protection against most of the well-known attacks, which performs exceptionally well in very large systems. In this paper, the authors give a detailed examination of small computational capacity systems from the point of view of security. This paper defines the model of attacker and the well-known attacks that can be achieved in these kinds of environments, as well as an illustration of the proposed protocol’s performance characteristics with measurements carried out in a simulation environment. This paper shows the effects of numerous attacks and the system’s different parameters on the authentication time while examining the performance and security characteristics of two other protocols chosen from the literature to compare the SLAP algorithm and give a proper explanation for the differences between them.
APA, Harvard, Vancouver, ISO, and other styles
4

Yu, Song Sen, Yun Peng, and Jia Jing Zhang. "A Lightweight RFID Mechanism Design." Advanced Materials Research 216 (March 2011): 120–23. http://dx.doi.org/10.4028/www.scientific.net/amr.216.120.

Full text
Abstract:
Based on the study of existing RFID security protocols and RFID anti-collision algorithms, this paper proposes a processing mechanism integrating lightweight random key double-authentication and dynamic slot-ALOHA protocol. The mechanism is simple, practical, and compatible with EPC Gen2 standards. Research shows that comparing with the other security protocols and anti-collision protocols, the new mechanism has a little complexity and tag-cost.
APA, Harvard, Vancouver, ISO, and other styles
5

Mansoor, Khwaja, Anwar Ghani, Shehzad Chaudhry, Shahaboddin Shamshirband, Shahbaz Ghayyur, and Amir Mosavi. "Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography." Sensors 19, no. 21 (2019): 4752. http://dx.doi.org/10.3390/s19214752.

Full text
Abstract:
Despite the many conveniences of Radio Frequency Identification (RFID) systems, the underlying open architecture for communication between the RFID devices may lead to various security threats. Recently, many solutions were proposed to secure RFID systems and many such systems are based on only lightweight primitives, including symmetric encryption, hash functions, and exclusive OR operation. Many solutions based on only lightweight primitives were proved insecure, whereas, due to resource-constrained nature of RFID devices, the public key-based cryptographic solutions are unenviable for RFID systems. Very recently, Gope and Hwang proposed an authentication protocol for RFID systems based on only lightweight primitives and claimed their protocol can withstand all known attacks. However, as per the analysis in this article, their protocol is infeasible and is vulnerable to collision, denial-of-service (DoS), and stolen verifier attacks. This article then presents an improved realistic and lightweight authentication protocol to ensure protection against known attacks. The security of the proposed protocol is formally analyzed using Burrows Abadi-Needham (BAN) logic and under the attack model of automated security verification tool ProVerif. Moreover, the security features are also well analyzed, although informally. The proposed protocol outperforms the competing protocols in terms of security.
APA, Harvard, Vancouver, ISO, and other styles
6

Agyemang, Justice Owusu, Jerry John Kponyo, James Dzisi Gadze, Henry Nunoo-Mensah, and Dantong Yu. "A Lightweight Messaging Protocol for Internet of Things Devices." Technologies 10, no. 1 (2022): 21. http://dx.doi.org/10.3390/technologies10010021.

Full text
Abstract:
The move towards intelligent systems has led to the evolution of IoT. This technological leap has over the past few years introduced significant improvements to various aspects of the human environment, such as health, commerce, transport, etc. IoT is data-centric; hence, it is required that the underlying protocols are scalable and sufficient to support the vast D2D communication. Several application layer protocols are being used for M2M communication protocols such as CoAP, MQTT, etc. Even though these messaging protocols have been designed for M2M communication, they are still not optimal for communications where message size and overhead are of much concern. This research paper presents a Lightweight Messaging Protocol (LiMP), which is a minified version of CoAP. We present a detailed protocol stack of the proposed messaging protocol and also perform a benchmark analysis of the protocol on some IoT devices. The proposed minified protocol achieves minimal overhead (a header size of 2 bytes) and has faster point-to-point communication from the benchmark analysis; for communication over LAN, the LiMP-TCP outperformed the CoAP-TCP by an average of 21% whereas that of LiMP-UDP was over 37%. For a device to remote server communication, LiMP outperformed CoAP by an average of 15%.
APA, Harvard, Vancouver, ISO, and other styles
7

Safkhani, Masoumeh, Nasour Bagheri, and Mahyar Shariat. "On the Security of Rotation Operation Based Ultra-Lightweight Authentication Protocols for RFID Systems." Future Internet 10, no. 9 (2018): 82. http://dx.doi.org/10.3390/fi10090082.

Full text
Abstract:
Passive Radio Frequency IDentification (RFID) tags are generally highly constrained and cannot support conventional encryption systems to meet the required security. Hence, designers of security protocols may try to achieve the desired security only using limited ultra-lightweight operations. In this paper, we show that the security of such protocols is not provided by using rotation functions. In the following, for an example, we investigate the security of an RFID authentication protocol that has been recently developed using rotation function named ULRAS, which stands for an Ultra-Lightweight RFID Authentication Scheme and show its security weaknesses. More precisely, we show that the ULRAS protocol is vulnerable against de-synchronization attack. The given attack has the success probability of almost ‘1’, with the complexity of only one session of the protocol. In addition, we show that the given attack can be used as a traceability attack against the protocol if the parameters’ lengths are an integer power of 2, e.g., 128. Moreover, we propose a new authentication protocol named UEAP, which stands for an Ultra-lightweight Encryption based Authentication Protocol, and then informally and formally, using Scyther tool, prove that the UEAP protocol is secure against all known active and passive attacks.
APA, Harvard, Vancouver, ISO, and other styles
8

Aloufi, Bashayer Othman, and Wajdi Alhakami. "A Lightweight Authentication MAC Protocol for CR-WSNs." Sensors 23, no. 4 (2023): 2015. http://dx.doi.org/10.3390/s23042015.

Full text
Abstract:
Cognitive radio (CR) has emerged as one of the most investigated techniques in wireless networks. Research is ongoing in terms of this technology and its potential use. This technology relies on making full use of the unused spectrum to solve the problem of the spectrum shortage in wireless networks based on the excessive demand for spectrum use. While the wireless network technology node’s range of applications in various sectors may have security drawbacks and issues leading to deteriorating the network, combining it with CR technology might enhance the network performance and improve its security. In order to enhance the performance of the wireless sensor networks (WSNs), a lightweight authentication medium access control (MAC) protocol for CR-WSNs that is highly compatible with current WSNs is proposed. Burrows–Abadi–Needham (BAN) logic is used to prove that the proposed protocol achieves secure and mutual authentication. The automated verification of internet security protocols and applications (AVISPA) simulation is used to simulate the system security of the proposed protocol and to provide formal verification. The result clearly shows that the proposed protocol is SAFE under the on-the-fly model-checker (OFMC) backend, which means the proposed protocol is immune to passive and active attacks such as man-in-the-middle (MITM) attacks and replay attacks. The performance of the proposed protocol is evaluated and compared with related protocols in terms of the computational cost, which is 0.01184 s. The proposed protocol provides higher security, which makes it more suitable for the CR-WSN environment and ensures its resistance against different types of attacks.
APA, Harvard, Vancouver, ISO, and other styles
9

Padiya, Sagar, and Vijay Gulhane. "Analysis of Lightweight Approaches for IoT Protocols." International Journal of Ingenious Research, Invention and Development 1, no. 1 (2022): 26–33. https://doi.org/10.5281/zenodo.7878056.

Full text
Abstract:
Current IoT systems are characterized by using resource-constrained electronic devices therefore new lightweight protocols should be designed to reduce communications costs, computational costs, and storage costs. For such requirements many researchers have already proposed various novel methodologies here we have analysed all of these. This research paper includes a survey of lightweight approaches for IoT protocols
APA, Harvard, Vancouver, ISO, and other styles
10

Gulhane, Vijay, and Sagar Padiya. "Analysis of Lightweight Approaches for IoT Protocols." International Journal of Ingenious Research, Invention and Development (IJIRID) 1, no. 1 (2022): 26–33. https://doi.org/10.5281/zenodo.7461118.

Full text
Abstract:
Current IoT systems are characterized by using resource-constrained electronic devices therefore new lightweight protocols should be designed to reduce communications costs, computational costs, and storage costs. For such requirements many researchers have already proposed various novel methodologies here we have analysed all of these. This research paper includes a survey of lightweight approaches for IoT protocols.
APA, Harvard, Vancouver, ISO, and other styles
11

Oh, JiHyeon, SungJin Yu, JoonYoung Lee, SeungHwan Son, MyeongHyun Kim, and YoungHo Park. "A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes." Sensors 21, no. 4 (2021): 1488. http://dx.doi.org/10.3390/s21041488.

Full text
Abstract:
With the information and communication technologies (ICT) and Internet of Things (IoT) gradually advancing, smart homes have been able to provide home services to users. The user can enjoy a high level of comfort and improve his quality of life by using home services provided by smart devices. However, the smart home has security and privacy problems, since the user and smart devices communicate through an insecure channel. Therefore, a secure authentication protocol should be established between the user and smart devices. In 2020, Xiang and Zheng presented a situation-aware protocol for device authentication in smart grid-enabled smart home environments. However, we demonstrate that their protocol can suffer from stolen smart device, impersonation, and session key disclosure attacks and fails to provide secure mutual authentication. Therefore, we propose a secure and lightweight authentication protocol for IoT-based smart homes to resolve the security flaws of Xiang and Zheng’s protocol. We proved the security of the proposed protocol by performing informal and formal security analyses, using the real or random (ROR) model, Burrows–Abadi–Needham (BAN) logic, and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. Moreover, we provide a comparison of performance and security properties between the proposed protocol and related existing protocols. We demonstrate that the proposed protocol ensures better security and lower computational costs than related protocols, and is suitable for practical IoT-based smart home environments.
APA, Harvard, Vancouver, ISO, and other styles
12

Yu, Ki-soon, Sung-joon Kim, Won-kyu Park, Min-Ho Jang, and Dae-woon Lim. "Implement of Lightweight Security Protocol." Journal of Korean Institute of Communications and Information Sciences 43, no. 4 (2018): 723–29. http://dx.doi.org/10.7840/kics.2018.43.4.723.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

赵, 士琦. "Improved Lightweight Anonymous Authentication Protocol." Advances in Applied Mathematics 09, no. 05 (2020): 759–64. http://dx.doi.org/10.12677/aam.2020.95090.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Chen, Chien-Ming, Shuai-Min Chen, Xinying Zheng, Pei-Yu Chen, and Hung-Min Sun. "A Secure RFID Authentication Protocol Adopting Error Correction Code." Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/704623.

Full text
Abstract:
RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance.
APA, Harvard, Vancouver, ISO, and other styles
15

Galih, Bangun Santosa, and Budiyanto Setiyo. "New design of lightweight authentication protocol in wearable technology." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 2 (2019): 561–72. https://doi.org/10.12928/TELKOMNIKA.v17i2.10344.

Full text
Abstract:
Today, the use of wearable devices is becoming a thing inherent in the daily activities of urban communities. In practice, wearable communications may contain sensitive information regarding a user's health record, so authentication and confidentiality of data exchanged must be guaranteed. In addition, the success of authentication between users, wearable devices and smartphones is very important because there are various threats of attack on the authentication process. Based on previous studies, it was found that the security functionality of user impersonation attack is not owned by lightweight authentication protocols in the current wearable communication environment. So this research undertakes the design of a lightweight authentication protocol to be immune to user impersonation attacks to supplement the lack of security functionality in previous protocols with the support of performing a formal analysis using the Scyther Tool. The research method used is a Research Library supported by conducting protocol security test experiment. The developed protocol utilizes a modified and customized S-NCI key establishment protocol scheme to meet all targeted security functionality. The research resulted that the lightweight authentication protocol generated was immune to the impersonation attacks of users, then was able to add two new functionalities that added wearable devices and added smartphones.
APA, Harvard, Vancouver, ISO, and other styles
16

P., K. Ghibitha Bebin, Gifta Irine Sophiya T., and Vijayanandh T. "Implementation of LWM2M Protocol in Constrained IoT Devices." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2020): 3579–84. https://doi.org/10.35940/ijeat.C6028.029320.

Full text
Abstract:
An emerging Lightweight machine to machine had been indulged with a high speed portable client-server specification. The LWM2M was helpfull for constrained networks. It has systematic machine manipulation also with an invulnerability venture, was supported in IoT applications. Research activities also focus on the server domain was in process in LWM2M. In LWM2M end-nodes are always resource-constrained. The client-side authorized LWM2M functionalities are not only critical and crucial also challenging. To approach the client-side set-up in LWM2M, it has a proper authenticity environment embedded in hand with IoT node. Its interconnection was predetermined to associate with the lightweight protocol stack and response was figured up by the LWM2M v1.0 specification. The usability and effectiveness of Lightweight protocol validated using a real-world application. Building a home automation product is one of the most effective parts is to think about protocols. Thus the LWM2M protocols are one of the efficient ways to communicate to gateways, servers, and sensors.
APA, Harvard, Vancouver, ISO, and other styles
17

Hou, Yubao, Hua Liang, and Juan Liu. "Super Lightweight Mobile RFID Authentication Protocol for Bit Replacement Operation." International Journal of Mobile Computing and Multimedia Communications 12, no. 1 (2021): 63–77. http://dx.doi.org/10.4018/ijmcmc.2021010104.

Full text
Abstract:
In the traditional RFID system, the secure wired channel communication is used between the reader and the server, and the new mobile RFID system is different from the traditional RFID system. The reader and the server communicate based on the wireless channel. This makes authentication protocols applicable to traditional RFID systems not applicable to mobile RFID systems. To solve this defect, a two-way authentication protocol MSB is proposed for ultra-lightweight mobile radio frequency identification system based on bit replacement operation. MSB (most significant bit) encrypts information based on bitwise operations, and the amount of computation of the communication entity is reduced. Tags, readers, and servers first authenticate and then communicate. MSB can be resistant to common attacks. The security analysis of the protocol shows that the protocol has high security attributes, and the performance analysis of the protocol shows that the protocol has the characteristics of low calculation volume. The formal analysis of the protocol is given based on GNY logic.
APA, Harvard, Vancouver, ISO, and other styles
18

Qing Fan, Qing Fan, Jianhua Chen Qing Fan, Yihong Wen Jianhua Chen, and Min Luo Yihong Wen. "Eland: An Efficient Lightweight Anonymous Authentication Protocol Applied to Digital Rights Management System." 網際網路技術學刊 23, no. 2 (2022): 267–78. http://dx.doi.org/10.53106/160792642022032302007.

Full text
Abstract:
<p>A digital rights management (DRM) system provides the function of packaging raw content into an appropriate distribution form, protection for content temper-proof transmission and circumvention of unauthorized use. The digital rights contents in DRM system improve people’s spiritual quality and create huge market value. However, in the sharing of digital contents, malicious adversaries could bring security and privacy issues even cause infringement of copyright. To solve these problems, valid user identity authentication and secret key distribution to legal users is an efficient method. Nevertheless, the existing authentication schemes for DRM system have problems of security weakness or efficiency to be enhanced. Thereby, we cryptanalyze these protocols’ vulnerabilities and propose a new lightweight anonymous authentication protocol called Eland that can be efficiently applied to DRM system. We compare our protocol with six DRM-related authentication protocols from the aspects of security properties, computation expense and communication cost. Comparisons results indicate that our protocol achieves a well trade-off between security and performance. Specifically, our protocol reduces 37.5% communication cost and satisfies more security requirements than Yu et al.’s scheme.</p> <p> </p>
APA, Harvard, Vancouver, ISO, and other styles
19

Xie, Qingyun, Zixuan Ding, and Qi Xie. "A Lightweight and Privacy-Preserving Authentication Protocol for Healthcare in an IoT Environment." Mathematics 11, no. 18 (2023): 3857. http://dx.doi.org/10.3390/math11183857.

Full text
Abstract:
In Internet of Things (IoT)-based healthcare, sensor nodes are deployed to detect the patient’s physiological data in a wireless sensor network. In order to prevent unwarranted users from accessing the sensor network to obtain patients’ data, designing lightweight and privacy-preserving authentication protocols plays a crucial role. Many lightweight authentication protocols for IoT-based healthcare have been proposed in recent years, but most of them may suffer from one or more security problems. In particular, few protocols can resist sensor node-captured attacks and achieve n-factor secrecy, which leads to unauthorized personnel being able to access the patient’s physiological data and obtain patients’ privacy. Therefore, a lightweight and privacy-preserving authentication protocol for healthcare based on elliptic curve cryptography (ECC) and physical unclonable function (PUF) is proposed to surmount the above obstacles. We design a dynamic anonymity strategy to achieve users’ anonymity and unlinkability and use PUF to protect information stored in users’ devices and sensor nodes. In addition, higher security features such as three-factor secrecy, perfect forward secrecy, resistance to sensor node-captured attacks, and update asynchronous attacks are guaranteed. The proposed protocol is proven to be secure under the random oracle model and maintains lightweight computing efficiency.
APA, Harvard, Vancouver, ISO, and other styles
20

Jiang, Zhengtao, Xiaoxuan Guo, Ting Yu, Hanyu Zhou, Jiaqi Wen, and Zhengyang Wu. "Private Set Intersection Based on Lightweight Oblivious Key-Value Storage Structure." Symmetry 15, no. 11 (2023): 2083. http://dx.doi.org/10.3390/sym15112083.

Full text
Abstract:
At this stage, the application of Private Set Intersection (PSI) protocols is essential for smart homes. Oblivious Key-Value Stores (OKVS) can be used to design efficient PSI protocols. Constructing OKVS with a cuckoo hashing graph is a common approach. It increases the number of hash functions while reducing the possibility of collisions into rings. However, the existing OKVS construction scheme requires a high time overhead, and such an OKVS applied to PSI protocols would also have a high communication overhead. In this paper, we propose a method called 3-Hash Garbled Cuckoo Graph (3H-GCG) for constructing cuckoo hash graphs. Specifically, this method handles hash collisions between different keys more efficiently than existing methods, and it can also be used to construct an OKVS structure with less storage space. Based on the 3H-GCG, we design a PSI protocol using the Vector Oblivious Linear Evaluation (VOLE) and OKVS paradigm, which achieves semi-honest security and malicious security. Extensive experiments demonstrate the effectiveness of our method. When the set size is 218–220, our PSI protocol is less computationally intensive than other existing protocols. The experiments also show an increase in the ratio of raw to constructed data of about 7.5%. With the semi-honest security setting, our protocol achieves the fastest runtime with the set size of 218. With malicious security settings, our protocol has about 10% improvement in communication compared with other existing protocols.
APA, Harvard, Vancouver, ISO, and other styles
21

Chen, Chien-Ming, and Shuangshuang Liu. "Improved Secure and Lightweight Authentication Scheme for Next-Generation IoT Infrastructure." Security and Communication Networks 2021 (September 30, 2021): 1–13. http://dx.doi.org/10.1155/2021/6537678.

Full text
Abstract:
The Internet of Things (IoT) is a huge network formed by connecting various information sensing devices through the Internet. Although IoT has been popularized in many fields, connected devices can be used only when network security is guaranteed. Recently, Rana et al. proposed a secure and lightweight authentication protocol for the next-generation IoT infrastructure. They claim that their protocol can resist major security attacks. However, in this study, we prove that their protocol is still vulnerable to offline password guessing attacks and privilege internal attacks. In order to solve these shortcomings, we propose an improved protocol, which is proved to be secure by formal and informal analysis. In addition, after comparing the time and memory consumption with other protocols, we find that our protocol has more advantages.
APA, Harvard, Vancouver, ISO, and other styles
22

He, Hong, Qi Li, and Zhi Hong Zhang. "RFID Security Authentication Protocol Based on Hash for the Lightweight RFID Systems." Applied Mechanics and Materials 380-384 (August 2013): 2831–36. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2831.

Full text
Abstract:
In order to solve the RFID authentication protocols, a new mutual authentication protocol based on Hash for the lightweight RFID system is proposed in this paper. Compared with several RFID authentication protocols with the similar structure, the proposed protocol can effectively solve the privacy and security of the RFID system, and it has significant performance advantages. It greatly reduces the amount storage and computation of tags.
APA, Harvard, Vancouver, ISO, and other styles
23

Zhang, Xiaowen, Zhanyang Zhang, and Xinzhou Wei. "An Improved Lightweight RFID Authentication Protocol." International Journal of Applied Logistics 2, no. 1 (2011): 76–84. http://dx.doi.org/10.4018/jal.2011010105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Zhang, Xiaowen, Zhanyang Zhang, and Xinzhou Wei. "An Improved Lightweight RFID Authentication Protocol." International Journal of Applied Logistics 2, no. 1 (2011): 76–84. http://dx.doi.org/10.4018/ijal.2011010105.

Full text
Abstract:
This study extends the vulnerability analysis of a RFID authentication protocol and offers solutions to security weaknesses through enhanced measures. Vajda and Buttyan (VB) proposed a lightweight RFID authentication protocol, called XOR. Defend, Fu, and Juels (DFJ) analyzed it and proposed repeated keys and nibble attacks to the protocol. In this paper, we identify the source of vulnerability within VB’s original successive session key permutation algorithm. We propose three improvements, namely removing bad shuffles, hopping the runs, and authenticating mutually, to prevent DFJ’s attacks, thereby significantly strengthening the security of the protocol without introducing extra resource cost.
APA, Harvard, Vancouver, ISO, and other styles
25

Taresh, Hiba. "PROPOSED LIGHTWEIGHT PROTOCOL FOR IOT AUTHENTICATION." Iraqi Journal for Computers and Informatics 44, no. 1 (2018): 18–22. http://dx.doi.org/10.25195/ijci.v44i1.113.

Full text
Abstract:
The Internet of Things (IoT) alludes to interestingly identifiable items (things) which can communicate with differentquestions through the worldwide framework of remote/wired Internet. The correspondence system among an expansive number of assetobliged gadgets that produce substantial volumes of information affects the security and protection of the included items. In thispaper, we propose a lightweight protocol for IoT authentication which based on two algorithms LA1 and RA1 which is used forauthentication and generating session key that is used for encryption.
APA, Harvard, Vancouver, ISO, and other styles
26

Chen, Chien-Ming, King-Hang Wang, Weicheng Fang, Tsu-Yang Wu, and Eric Ke Wang. "Reconsidering a lightweight anonymous authentication protocol." Journal of the Chinese Institute of Engineers 42, no. 1 (2019): 9–14. http://dx.doi.org/10.1080/02533839.2018.1537808.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Yang, Ming Hour. "Across-authority lightweight ownership transfer protocol." Electronic Commerce Research and Applications 10, no. 4 (2011): 375–83. http://dx.doi.org/10.1016/j.elerap.2011.03.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Anuradha, J. A. D. C., Rohan Samarasinghe, and Saluka R. "SecAODV: Lightweight Authentication for AODV Protocol." International Journal of Computer Applications 137, no. 13 (2016): 33–38. http://dx.doi.org/10.5120/ijca2016909034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Xiao, Liang, He Xu, Feng Zhu, Ruchuan Wang, and Peng Li. "SKINNY-Based RFID Lightweight Authentication Protocol." Sensors 20, no. 5 (2020): 1366. http://dx.doi.org/10.3390/s20051366.

Full text
Abstract:
With the rapid development of the Internet of Things and the popularization of 5G communication technology, the security of resource-constrained IoT devices such as Radio Frequency Identification (RFID)-based applications have received extensive attention. In traditional RFID systems, the communication channel between the tag and the reader is vulnerable to various threats, including denial of service, spoofing, and desynchronization. Thus, the confidentiality and integrity of the transmitted data cannot be guaranteed. In order to solve these security problems, in this paper, we propose a new RFID authentication protocol based on a lightweight block cipher algorithm, SKINNY, (short for LRSAS). Security analysis shows that the LRSAS protocol guarantees mutual authentication and is resistant to various attacks, such as desynchronization attacks, replay attacks, and tracing attacks. Performance evaluations show that the proposed solution is suitable for low-cost tags while meeting security requirements. This protocol reaches a balance between security requirements and costs.
APA, Harvard, Vancouver, ISO, and other styles
30

Haiyan Wang, Haiyan Wang, and Haibing Mu Haiyan Wang. "A Lightweight V2R Authentication Protocol Based on PUF and Chebyshev Chaotic Map." 電腦學刊 34, no. 2 (2023): 099–112. http://dx.doi.org/10.53106/199115992023043402008.

Full text
Abstract:
<p>Internet of Vehicles (IoV) plays an important role in enhancing the intelligence of social transportation services. However, there are existing such as privacy leakage, computational complexity and low efficiency on V2R authentication protocols. To solve these problems, a lightweight V2R authentication protocol according to physical unclonable function (PUF) and Chebyshev chaotic map is proposed. The lightweight property of PUF in this scheme can solve the resource constraint problem of the On-Board Unit (OBU) effectively. The fuzzy extractor can correct for small variations in PUF response and improve the accuracy of data transmission. Besides, Chebyshev chaotic map with good cryptographic properties establishes a secure session key while achieving mutual authentication of V2R. Finally, simulation results show that the scheme combining PUF, chaotic map, and fuzzy extractor in this paper saves 4.7% to 49% in communication and calculation overhead comparing with existing protocols. In terms of security, our scheme can also meet the requirements well in the V2R authentication protocol for IoV.</p> <p> </p>
APA, Harvard, Vancouver, ISO, and other styles
31

Goyal, Dinesh, Anil Kumar, Yatin Gandhi, and Vinit Khetani. "Securing wireless sensor networks with novel hybrid lightweight cryptographic protocols." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 2-B (2024): 703–14. http://dx.doi.org/10.47974/jdmsc-1921.

Full text
Abstract:
WSN are essential in the Internet of Things (IoT) framework as they enable the gathering and transmission of data in different fields. The limited resources of sensor nodes in these networks require security protocols that are lightweight, striking a balance between data protection and efficiency. This research paper introduces a new hybrid cryptographic protocol called AES-128-CCM + Diffie-Hellman (ACDH), which aims to tackle the security issues encountered by WSN. Here present thorough assessment of the ACDH protocol, with a specific emphasis on critical factors including Security Strength, Energy Efficiency and Communication Overhead. The comparative study examines the ACDH protocol in relation to three well-established lightweight cryptographic protocols like Lightweight IPSec, BLAKE2, and Simon. We analyze and highlight the differences between these protocols. These protocols function as standards for evaluating the efficiency of ACDH in a practical WSN setting. The evaluation unequivocally showcases the supremacy of the proposed ACDH model across various crucial aspects. ACDH demonstrates exceptional Security Strength, guaranteeing strong resilience against established cryptographic attacks and providing a high degree of data safeguarding. It demonstrates exceptional Energy Efficiency, enabling sensor nodes to preserve energy resources while upholding a high standard of security ACDH reduces Resource Utilization, optimizing the utilization of memory and processing power. The protocol’s Communication Overhead is significantly minimal, guaranteeing the most efficient utilization of restricted bandwidth. The ACDH hybrid model consistently surpasses its counterparts in performance, making it the optimal selection for securing WSNs while adhering to the resource limitations of sensor nodes. The results of our research highlight the capability of ACDH as an innovative solution for developing lightweight cryptographic protocols that can improve the security and efficiency of Wireless Sensor Networks in the growing IoT environment.
APA, Harvard, Vancouver, ISO, and other styles
32

Putri, Dinda, and Annisa Dini. "Analisis Formal Lightweight Mutual Authentication RFID Protocol Menggunakan Scyther." Info Kripto 16, no. 1 (2022): 7–14. http://dx.doi.org/10.56706/ik.v16i1.42.

Full text
Abstract:
Salah satu faktor penting dalam protokol komunikasi adalah adanya autentikasi. Autentikasi merupakan suatu metode untuk memastikan bahwa entitas yang berkomunikasi merupakan entitas yang benar. Protokol yang memanfaatkan autentikasi salah satunya adalah protokol yang ada dalam Radio Frequency and Identification (RFID). RFID merupakan teknologi yang digunakan untuk melakukan identifikasi dan pengambilan data menggunakan gelombang radio. RFID menggunakan beberapa komponen dalam penerapannya, yaitu tag, reader, dan server (database). Dalam implementasi protokol pada RFID, dibutuhkan mekanisme autentikasi antar entitas yang berkomunikasi. Salah satu protokol RFID yang telah menerapkan mekanisme autentikasi adalah Lightweight Mutual Authentication RFID Protocol yang diajukan oleh Kang. Protokol milik Kang terdiri dari 3 varian, yaitu Single-tag, Double-tag, dan Multi-tag. Ketiga varian protokol ini diklaim aman terhadap serangan replay, relay, dan eavesdropping, serta memenuhi anonimitas tag dan forward security. Meskipun demikian, klaim keamanan tersebut belum dilengkapi dengan tingkat autentikasi yang dipenuhi oleh protokol milik Kang. Oleh karena itu, pada penelitian ini dilakukan pengujian pemenuhan tingkat autentikasi pada protokol Kang, khususnya varian Single-tag dan Double-tag menggunakan alat uji Scyther. Tingkat autentikasi yang diuji terdiri dari aliveness, weak-agreement, non-injective agreement, dan non-injective synchronization. Hasil penelitian ini, menunjukkan bahwa protokol Kang memenuhi keempat klaim keamanan dan tanpa serangan untuk varian Single-tag, serta memenuhi keempat klaim keamanan dan tanpa serangan dalam batasan untuk varian Double-tag.
APA, Harvard, Vancouver, ISO, and other styles
33

Al Ahmed, Mahmoud Tayseer, Fazirulhisyam Hashim, Shaiful Jahari Hashim, and Azizol Abdullah. "Authentication-Chains: Blockchain-Inspired Lightweight Authentication Protocol for IoT Networks." Electronics 12, no. 4 (2023): 867. http://dx.doi.org/10.3390/electronics12040867.

Full text
Abstract:
Internet of Things networks (IoT) are becoming very important in industrial, medical, and commercial applications. The security aspect of IoT networks is critical, especially the authentication of the devices in the network. The current security model in IoT networks uses centralized key exchange servers that present a security weak point. IoT networks need decentralized management for network security. Blockchain, with its decentralized model of authentication, can provide a solution for decentralized authentication in IoT networks. However, blockchain authentication models are known to be computationally demanding because they require complex mathematical calculations. In this paper, we present an Authentication-Chains protocol which is a lightweight decentralized protocol for IoT authentication based on blockchain distributed ledger. The proposed protocol arranges the nodes in clusters and creates an authentication blockchain for each cluster. These cluster chains are connected by another blockchain. A new consensus algorithm based on proof of identity authentication is adapted to the limited computational capabilities of IoT devices. The proposed protocol security performance is analyzed using cryptographic protocols verifier software and tested. Additionally, a test bed consisting of a Raspberry Pi network is presented to analyze the performance of the proposed protocol.
APA, Harvard, Vancouver, ISO, and other styles
34

Aseeri, Aisha, and Omaimah Bamasag. "Achieving protection against man-in-the-middle attack in HB family protocols implemented in RFID tags." International Journal of Pervasive Computing and Communications 12, no. 3 (2016): 375–90. http://dx.doi.org/10.1108/ijpcc-03-2016-0015.

Full text
Abstract:
Purpose In the past few years, HB-like protocols have gained much attention in the field of lightweight authentication protocols due to their efficient functioning and large potential applications in low-cost radio frequency identification tags, which are on the other side spreading so fast. However, most published HB protocols are vulnerable to man-in-the-middle attacks such as GRS or OOV attacks. The purpose of this research is to investigate security issues pertaining to HB-like protocols with an aim of improving their security and efficiency. Design/methodology/approach In this paper, a new and secure variant of HB family protocols named HB-MP* is proposed and designed, using the techniques of random rotation. The security of the proposed protocol is proven using formal proofs. Also, a prototype of the protocol is implemented to check its applicability, test the security in implementation and to compare its performance with the most related protocol. Findings The HB-MP* protocol is found secure against passive and active adversaries and is implementable within the tight resource constraints of today’s EPC-type RFID tags. Accordingly, the HB-MP* protocol provides higher security than previous HB-like protocols without sacrificing performance. Originality/value This paper proposes a new HB variant called HB-MP* that tries to be immune against the pre-mentioned attacks and at the same time keeping the simple structure. It will use only lightweight operations to randomize the rotation of the secret.
APA, Harvard, Vancouver, ISO, and other styles
35

Yasser R. Alselehibi, Yasser R. Alselehibi. "Secure Lightweight Routing Scheme for Energy Efficient Wireless Sensor Networks." journal of King Abdulaziz University Computing and Information Technology Sciences 8, no. 2 (2019): 57–68. http://dx.doi.org/10.4197/comp.8-2.5.

Full text
Abstract:
The technology revolution in wireless communications and micro-electro-mechanical systems (MEMS) directly affects the development of wireless sensor networks (WSNs), which are used in several application areas, including the military, home, and environment. One of the best categories of routing networks in WSNs are hierarchical protocols (cluster-based). The wellknown protocols in this category include the Low Energy Adaptive Clustering Hierarchy (LEACH). However, the LEACH is vulnerable to many attacks. To provide cryptographic protection against outsider attacks, a modified version of LEACH, called Enhancing Secure LEACH (MS-LEACH) protocol, is used. MS-LEACH enhances security but increases power consumption. To maintain an acceptable level of security and decrease the power consumption of secure LEACH protocols, the present research proposes a Secure Lightweight LEACH (SLWLEACH) scheme. The simulation results show that this proposed SLW-LEACH protocol outperforms the MS-LEACH in terms of ne
APA, Harvard, Vancouver, ISO, and other styles
36

Fan, Kai, Chen Zhang, Kan Yang, Hui Li, and Yintang Yang. "Lightweight NFC Protocol for Privacy Protection in Mobile IoT." Applied Sciences 8, no. 12 (2018): 2506. http://dx.doi.org/10.3390/app8122506.

Full text
Abstract:
The Internet of Things (IoT) aims to achieve the interconnection of all devices in our lives. Due to the complex network environment, the IoT with mobile devices often faces many security problems, such as privacy leakages and identity forgery attacks. As a developing technology in mobile IoT, near field communication (NFC) is widely used in electronic payments and identity authentications. The current NFC studies mainly focus on payment technology, but there are a few studies on privacy protection and the lightweight requirements in the mobile IoT authentication protocol. We focus on the lightweight privacy protection authentication technology in mobile IoT. In the paper, we summarize the clustering model in mobile IoT networks and propose a lightweight authentication protocol. A security analysis shows that the protocol can resist many security threats, such as privacy leakages, identity forgeries, and replay attacks. The simulation also shows that the protocol is lightweight, with the utilization of look-up-tables (LUTs) and registers in our protocol being less than 0.5%. Our work can provide a secure and lightweight mobile authentication serve in the NFC-based mobile IoT network such as smart home and office attendance.
APA, Harvard, Vancouver, ISO, and other styles
37

Shyaa, Ghanima Sabr, and Mishall Al-Zubaidie. "Utilizing Trusted Lightweight Ciphers to Support Electronic-Commerce Transaction Cryptography." Applied Sciences 13, no. 12 (2023): 7085. http://dx.doi.org/10.3390/app13127085.

Full text
Abstract:
Electronic-commerce (e-commerce) has become a provider of distinctive services to individuals and companies due to the speed and flexibility of transferring orders and completing commercial deals across far and different places. However, due to the increasing attacks on penetrating transaction information or tampering with e-commerce requests, the interest in protecting this information and hiding it from tamperers has become extremely important. In addition, hacking these deals can cause a huge waste of money and resources. Moreover, large numbers of connected and disconnected networks can cause significant disruption to the built-in security measures. In this paper, we propose to design a protocol to protect transaction information based on ElGamal, advanced encryption standard (AES) and Chinese remainder theorem (CRT) techniques. In addition, our protocol ensures providing scalability with high-performance security measures. We combine these algorithms with a robust methodology that supports the balance of performance and security of the proposed protocol. An analysis of our results proves that our protocol is superior to existing security protocols.
APA, Harvard, Vancouver, ISO, and other styles
38

Tarigan, Salsalina Oktaria, Herry Imanta Sitepu, and Maclaurin Hutagalung. "Pengukuran Kinerja Sistem Publish/ Subscribe Menggunakan Protokol MQTT (Message Queuing Telemetry Transport)." Jurnal Telematika 9, no. 1 (2014): 20. http://dx.doi.org/10.61769/telematika.v9i1.85.

Full text
Abstract:
Salah satu model sistem terdistribusi yang digunakan untuk komunikasi antar perangkat adalah dengan sistem publish/subscribe (PUB/SUB). Ada beberapa protokol yang dapat digunakan untuk melakukan komunikasi publish/subscribe, salah satunya adalah protokol MQTT. Protokol MQTT adalah protokol yang didesain dengan karakteristik sederhana, ringan, dan mudah untuk diimplementasikan. Dengan demikian MQTT dapat diimplementasikan di perangkat dengan sumber daya komputasi yang terbatas. MQTT memiliki 3 level QoS, yaitu QoS 0, 1, dan 2. Penelitian ini mengukur dampak dari QoS protokol QTT terhadap QoS jaringan, yaitu bandwidth, delay, jitter, dan packet loss. Hasil dari penelitian tersebut menunjukkan QoS pada protokol MQTT berpengaruh pada QoS jaringan, yaitu bandwidth, delay, jitter, dan packet loss pada jaringan subscriber. One of the distributed system model useed for communication between devices is a publish/subscribe. There are some protocols that can be used for communication in publish/subscribe. MQTT protocol is one of them. MQTT protocol is a messaging protocol that is designed with characteristic such as simple, lightweight, and easy to implement. Thus, MQTT can be implemented in the devices with limited computing resources. MQTT has 3 levels of QoS, i.e. QoS 0, 1, and 2. This research measured the impact of MQTT protocol QOS in network QoS, i.e. bandwidth, delay, jitter, and packet loss. The result shows that MQTT protocol QoS impacts of network QoS, i.e. bandwidth, delay, jitter, and packet loss on the network subscriber.
APA, Harvard, Vancouver, ISO, and other styles
39

Khan, Muhammad Ayaz, Subhan Ullah, Tahir Ahmad, Khwaja Jawad, and Attaullah Buriro. "Enhancing Security and Privacy in Healthcare Systems Using a Lightweight RFID Protocol." Sensors 23, no. 12 (2023): 5518. http://dx.doi.org/10.3390/s23125518.

Full text
Abstract:
Exploiting Radio Frequency Identification (RFID) technology in healthcare systems has become a common practice, as it ensures better patient care and safety. However, these systems are prone to security vulnerabilities that can jeopardize patient privacy and the secure management of patient credentials. This paper aims to advance state-of-the-art approaches by developing more secure and private RFID-based healthcare systems. More specifically, we propose a lightweight RFID protocol that safeguards patients’ privacy in the Internet of Healthcare Things (IoHT) domain by utilizing pseudonyms instead of real IDs, thereby ensuring secure communication between tags and readers. The proposed protocol has undergone rigorous testing and has been proven to be secure against various security attacks. This article provides a comprehensive overview of how RFID technology is used in healthcare systems and benchmarks the challenges faced by these systems. Then, it reviews the existing RFID authentication protocols proposed for IoT-based healthcare systems in terms of their strengths, challenges, and limitations. To overcome the limitations of existing approaches, we proposed a protocol that addresses the anonymity and traceability issues in existing schemes. Furthermore, we demonstrated that our proposed protocol had a lower computational cost than existing protocols and ensured better security. Finally, our proposed lightweight RFID protocol ensured strong security against known attacks and protected patient privacy using pseudonyms instead of real IDs.
APA, Harvard, Vancouver, ISO, and other styles
40

Van Glabbeek, Roald, Diana Deac, Thomas Perale, Kris Steenhaut, and An Braeken. "Flexible and Efficient Security Framework for Many-to-Many Communication in a Publish/Subscribe Architecture." Sensors 22, no. 19 (2022): 7391. http://dx.doi.org/10.3390/s22197391.

Full text
Abstract:
Message Queuing Telemetry Transport (MQTT) is a lightweight publish/subscribe protocol, which is currently one of the most popular application protocols in Internet of Things (IoT) thanks to its simplicity in use and its scalability. The secured version, MQTTS, which combines MQTT with the Transport Layer Security (TLS) protocol, has several shortcomings. It only offers one-to-one security, supports a limited number of security features and has high computation and communication costs. In this paper, we propose a flexible and lightweight security solution to be integrated in MQTT, addressing many-to-many communication, which reduces the communication overhead by 80% and the computational overhead by 40% for the setup of a secure connection on the client side.
APA, Harvard, Vancouver, ISO, and other styles
41

Xie, Qi, Dongnan Liu, Zixuan Ding, Xiao Tan, and Lidong Han. "Provably Secure and Lightweight Patient Monitoring Protocol for Wireless Body Area Network in IoHT." Journal of Healthcare Engineering 2023 (February 13, 2023): 1–13. http://dx.doi.org/10.1155/2023/4845850.

Full text
Abstract:
As one of the important applications of Internet of Health Things (IoHT) technology in the field of healthcare, wireless body area network (WBAN) has been widely used in medical therapy, and it can not only monitor and record physiological information but also transmit the data collected by sensor devices to the server in time. However, due to the unreliability and vulnerability of wireless network communication, as well as the limited storage and computing resources of sensor nodes in WBAN, a lot of authentication protocols for WBAN have been devised. In 2021, Alzahrani et al. designed an anonymous medical monitoring protocol, which uses lightweight cryptographic primitives for WBAN. However, we find that their protocol is defenseless to off-line identity guessing attacks, known-key attacks, and stolen-verifier attacks and has no perfect forward secrecy. Therefore, a patient monitoring protocol for WBAN in IoHT is proposed. We use security proof under the random oracle model (ROM) and automatic verification tool ProVerif to demonstrate that our protocol is secure. According to comparisons with related protocols, our protocol can achieve both high computational efficiency and security.
APA, Harvard, Vancouver, ISO, and other styles
42

Haseeb-ur-rehman, Rana Muhammad Abdul, Misbah Liaqat, Azana Hafizah Mohd Aman, et al. "LR-AKAP: A Lightweight and Robust Security Protocol for Smart Home Environments." Sensors 22, no. 18 (2022): 6902. http://dx.doi.org/10.3390/s22186902.

Full text
Abstract:
For the betterment of human life, smart Internet of Things (IoT)-based systems are needed for the new era. IoT is evolving swiftly for its applications in the smart environment, including smart airports, smart buildings, smart manufacturing, smart homes, etc. A smart home environment includes resource-constrained devices that are interlinked, monitored, controlled, and analyzed with the help of the Internet. In a distributed smart environment, devices with low and high computational power work together and require authenticity. Therefore, a computationally efficient and secure protocol is needed. The authentication protocol is employed to ensure that authorized smart devices communicate with the smart environment and are accessible by authorized personnel only. We have designed a novel, lightweight secure protocol for a smart home environment. The introduced novel protocol can withstand well-known attacks and is effective with respect to computation and communication complexities. Comparative, formal, and informal analyses were conducted to draw the comparison between the introduced protocol and previous state-of-the-art protocols.
APA, Harvard, Vancouver, ISO, and other styles
43

Xia, Yandong, Rongxin Qi, Sai Ji, Jian Shen, Tiantian Miao, and Huaqun Wang. "PUF-Assisted Lightweight Group Authentication and Key Agreement Protocol in Smart Home." Wireless Communications and Mobile Computing 2022 (March 24, 2022): 1–15. http://dx.doi.org/10.1155/2022/8865158.

Full text
Abstract:
Various IoT-based applications such as smart home, intelligent medical, and VANETs have been put into practical utilization. The smart home is one of the most concerned environments, allowing users to access and control smart devices via the public network remotely. The smart home can provide many intelligent services for users through these smart devices. To securely access devices and obtain collected data over the public network, multifactor authentication protocols for smart home have gained wide attention. However, most of these protocols cannot withstand impersonation attack, smart device lost attack, privileged-insider attack, smart card lost attack, and so on. Besides, high communication and computational costs weaken the system performance, which leads to most authentication protocols are not suitable for resource-constrained smart devices. To mitigate the aforementioned drawbacks, we proposed a PUF-assisted lightweight group authentication and key agreement protocol to implement secure access to multiple devices in the smart home simultaneously using the Chinese Remainder Theorem and secret sharing technique. Our protocol also utilizes physical unclonable function (PUF) and fuzzy extractor technique to extract the digital fingerprint of the smart devices, which can uniquely validate smart devices and protect the secrets stored in their memory. Our protocol can support various security features and withstand the many well-known attacks in the smart home. The performance analysis indicates that the proposed protocol can efficiently reduce communication/computational costs when the user simultaneously accesses multiple devices.
APA, Harvard, Vancouver, ISO, and other styles
44

Tanveer, Muhammad, and Hisham Alasmary. "LACP-SG: Lightweight Authentication Protocol for Smart Grids." Sensors 23, no. 4 (2023): 2309. http://dx.doi.org/10.3390/s23042309.

Full text
Abstract:
Smart grid (SG) recently acquired considerable attention due to their utilization in sustaining demand response management in power systems. Smart meters (SMs) deployed in SG systems collect and transmit data to the server. Since all communications between SM and the server occur through a public communication channel, the transmitted data are exposed to adversary attacks. Therefore, security and privacy are essential requirements in the SG system for ensuring reliable communication. Additionally, an AuthentiCation (AC) protocol designed for secure communication should be lightweight so it can be applied in a resource-constrained environment. In this article, we devise a lightweight AC protocol for SG named LACP-SG. LACP-SG employs the hash function, “Esch256”, and “authenticated encryption” to accomplish the AC phase. The proposed LACP-SG assures secure data exchange between SM and server by validating the authenticity of SM. For encrypted communication, LACP-SG enables SM and the server to establish a session key (SEK). We use the random oracle model to substantiate the security of the established SEK. Moreover, we ascertain that LACP-SG is guarded against different security vulnerabilities through Scyther-based security validation and informal security analysis. Furthermore, comparing LACP-SG with other related AC protocols demonstrates that LACP-SG is less resource-intensive while rendering better security characteristics.
APA, Harvard, Vancouver, ISO, and other styles
45

Ryu, Hyunho, and Hyunsung Kim. "Privacy-Preserving Authentication Protocol for Wireless Body Area Networks in Healthcare Applications." Healthcare 9, no. 9 (2021): 1114. http://dx.doi.org/10.3390/healthcare9091114.

Full text
Abstract:
Mobile healthcare service has become increasingly popular thanks to the significant advances in the wireless body area networks (WBANs). It helps medical professionals to collect patient’s healthcare data remotely and provides remote medical diagnosis. Since the health data are privacy-related, they should provide services with privacy-preserving, which should consider security and privacy at the same time. Recently, some lightweight patient healthcare authentication protocols were proposed for WBANs. However, we observed that they are vulnerable to tracing attacks because the patient uses the same identifier in each session, which could leak privacy-related information on the patient. To defeat the weakness, this paper proposes a privacy-preserving authentication protocol for WBANs in healthcare service. The proposed protocol is only based on one-way hash function and with exclusive-or operation, which are lightweight operations than asymmetric cryptosystem operations. We performed two rigorous formal security proofs based on BAN logic and ProVerif tool. Furthermore, comparison results with the relevant protocols show that the proposed protocol achieves more privacy and security features than the other protocols and has suitable efficiency in computational and communicational concerns.
APA, Harvard, Vancouver, ISO, and other styles
46

Thammarat, Chalee. "Efficient and Secure NFC Authentication for Mobile Payment Ensuring Fair Exchange Protocol." Symmetry 12, no. 10 (2020): 1649. http://dx.doi.org/10.3390/sym12101649.

Full text
Abstract:
The standard protocol of near field communication (NFC) has concentrated primarily on the speed of communication while ignoring security properties. Message between an NFC-enabled smartphone and a point of sale are exchanged over the air (OTA), which is a message considered an authentication request for payment, billing, ticketing, loyalty services, identification or access control. An attacker who has an antenna can intercept or manipulate the exchanged messages to take advantage of these. In order to solve this problem, many researchers have suggested authentication methods for NFC communications. However, these remain inadequate transaction security and fairness. In this paper, we will propose a technique that ensures mutual authentication, security properties, and strong fairness. Mutual authentication is a security property that prevents replay attacks and man-in-the-middle attacks. Both fair exchange and transaction security are also significant issues in electronic transactions with regards to creating trust among the parties participating in the transaction. The suggested protocol deploys a secure offline session key generation technique to increase transaction security and, importantly, make our protocol lightweight while maintaining the fairness property. Our analysis suggests that our protocol is more effective than others regarding transaction security, fairness, and lightweight protocol. The proposed protocol checks robustness and soundness using Burrows, Abadi and Needham (BAN) logic, the Scyther tool, and automated validation of internet security protocols and applications (AVISPA) that provide formal proofs for security protocols. Furthermore, our protocol can resolve disputes in case one party misbehaves.
APA, Harvard, Vancouver, ISO, and other styles
47

Yu, SungJin, KiSung Park, JoonYoung Lee, et al. "Privacy-Preserving Lightweight Authentication Protocol for Demand Response Management in Smart Grid Environment." Applied Sciences 10, no. 5 (2020): 1758. http://dx.doi.org/10.3390/app10051758.

Full text
Abstract:
With the development in wireless communication and low-power device, users can receive various useful services such as electric vehicle (EV) charging, smart building, and smart home services at anytime and anywhere in smart grid (SG) environments. The SG devices send demand of electricity to the remote control center and utility center (UC) to use energy services, and UCs handle it for distributing electricity efficiently. However, in SG environments, the transmitted messages are vulnerable to various attacks because information related to electricity is transmitted over an insecure channel. Thus, secure authentication and key agreement are essential to provide secure energy services for legitimate users. In 2019, Kumar et al. presented a secure authentication protocol for demand response management in the SG system. However, we demonstrate that their protocol is insecure against masquerade, the SG device stolen, and session key disclosure attacks and does not ensure secure mutual authentication. Thus, we propose a privacy-preserving lightweight authentication protocol for demand response management in the SG environments to address the security shortcomings of Kumar et al.’s protocol. The proposed protocol withstands various attacks and ensures secure mutual authentication and anonymity. We also evaluated the security features of the proposed scheme using informal security analysis and proved the session key security of proposed scheme using the ROR model. Furthermore, we showed that the proposed protocol achieves secure mutual authentication between the SG devices and the UC using Burrows–Abadi–Needham (BAN) logic analysis. We also demonstrated that our authentication protocol prevents man-in-the-middle and replay attacks utilizing AVISPA simulation tool and compared the performance analysis with other existing protocols. Therefore, the proposed scheme provides superior safety and efficiency other than existing related protocols and can be suitable for practical SG environments.
APA, Harvard, Vancouver, ISO, and other styles
48

Lu, Xin Mei, and Lei He. "A Modified Two-Way Authentication Protocol without Server for RFID." Applied Mechanics and Materials 29-32 (August 2010): 2709–13. http://dx.doi.org/10.4028/www.scientific.net/amm.29-32.2709.

Full text
Abstract:
It is necessary for researchers to design lightweight authentication protocols to protect information security between tag and reader in RFID system. It is a great challenge to design an efficient and secure protocol because the tag has limited computation resource. In the paper, we firstly analyze some protocols. Secondly, we introduce a serverless authentication protocol for RFID system and analyze its security. We find it does not provide two-way authentication. Thirdly, we propose a modified two-way authentication protocol without server for RFID. The result indicates it provides privacy protection, resists tracking, and resists cloning attack. Moreover, it provides two-way authentication. For the efficiency, we think the computational complexity of our protocol is at the same level with the original protocol.
APA, Harvard, Vancouver, ISO, and other styles
49

Wang, Shaoqiang, Ziyao Fan, Yu Su, Baosen Zheng, Zhaoyuan Liu, and Yinfei Dai. "A Lightweight, Efficient, and Physically Secure Key Agreement Authentication Protocol for Vehicular Networks." Electronics 13, no. 8 (2024): 1418. http://dx.doi.org/10.3390/electronics13081418.

Full text
Abstract:
In the contemporary era, Vehicular Ad Hoc Networks (VANETs) have emerged as a vital technology in intelligent transportation systems, substantially enhancing the overall travel experience by providing advanced services to vehicles while ensuring driver safety. Despite the notable improvements, the inherent complexity of VANETs presents persistent security challenges, encompassing issues such as privacy preservation for vehicles, message authentication, and constraints in computational power and network bandwidth. Various authentication protocols have been designed for VANETs. However, many of these protocols exhibit significant vulnerabilities, rendering them insecure and unreliable in the face of diverse security threats, such as denial of service, replay, forgery, and impersonation attacks. Moreover, some existing schemes encounter limitations, including high computational complexity and the introduction of additional communication overhead and computational costs. To tackle these concerns, we designed a lightweight and secure identity authentication protocol based on elliptic curve cryptography with the objective of furnishing an effective and secure data transmission mechanism across a public communication channel for the Internet of Vehicles. In addition, we introduce Physically Unclonable Functions (PUFs) to ensure physical layer security during the communication process. A detailed security analysis demonstrates that the proposed protocol is resilient against various attacks. Through a comparative analysis with existing relevant protocols, in scenarios with a high density of vehicles, the algorithm demonstrates significantly lower computational costs and communication overhead than the related protocols, indicating that the proposed protocol is lightweight and efficient. Consequently, the empirical findings indicate that our protocol surpasses others in terms of reliability, user convenience, and practicality for ensuring secure data transmission within VANETs.
APA, Harvard, Vancouver, ISO, and other styles
50

DURRESI, ARJAN, VAMSI PARUCHURI, MIMOZA DURRESI, and LEONARD BAROLLI. "CLUSTERING PROTOCOL FOR SENSOR NETWORKS." Journal of Interconnection Networks 07, no. 04 (2006): 423–36. http://dx.doi.org/10.1142/s0219265906001788.

Full text
Abstract:
In this paper we present Clustering Protocol for Sensor networks (CPS). Clustering techniques are used by different protocols and applications to increase scalability and reduce delays in sensor networks. Examples include routing protocols, and applications requiring efficient data aggregation. Our approach is based on the Covering Problem that aims at covering an area with minimum number of circular disks. CPS is a lightweight protocol that does not require any neighborhood information and imposes low communication overhead. We present simulation results to show the efficiency of CPS in both ideal cases and randomly distributed networks. Moreover, CPS is scalable with respect to density and network size.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography