How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack
In Machine-to-Machine (M2M) communications, authentication of a device is of upmost importance for applications of Internet of Things. As traditional authentication schemes always assume the presence of a person, most authentication technologies cannot be applied in machine-centric M2M context. In t...
Saved in:
| Main Authors: | Wei Ren, Linchen Yu, Liangli Ma, Yi Ren |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2013-02-01
|
| Series: | International Journal of Distributed Sensor Networks |
| Online Access: | https://doi.org/10.1155/2013/679450 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Fault attacks on authenticated encryption modes for GIFT
by: Shuai Liu, et al.
Published: (2022-01-01) -
HMAC-Based Authentication Protocol: Attacks and Improvements
by: Behzad Abdolmaleki, et al.
Published: (2016-11-01) -
Formal verification of security properties of the Lightweight Authentication and Key Exchange Protocol for Federated IoT devices
by: Michał Jarosz, et al.
Published: (2022-09-01) -
Optimizing Group Multi-Factor Authentication for Secure and Efficient IoT Device Communications
by: Salem AlJanah, et al.
Published: (2025-05-01) -
Cross-Cultural Communication: Its Asymmetry and Authenticity
by: N. K. Riabtseva
Published: (2020-04-01)