We propose mutual authentication and session key exchange protocols based on certificates for the Internet of Things. We also propose an improved version for the conventional certificate-based systems. Our protocol is efficient, it requires fewer messages and only one session key. It gives use a new method to deal with such as preventing tampering and preventing interference security problems. In designing the security protocol proposed here, the low computational power of the wireless sensors nodes and the low bandwidth of the wireless networks are considered. It is good as low computational complexity and cannot be forged. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.477
This paper proposes a novel authentication protocol for wireless access security. Current symmetric ...
Abstract Industry 4.0 has brought solutions for faster data accessibility, fault identification, pe...
The Internet of Things (IoT) consists of a range of devices that communicate with other devices that...
The Internet of Things (IoT), which can be regarded as an enhanced version of machine-to-machine com...
The Internet-of-Things (IoT) will connect different types of cyber physical systems that are support...
Since the early 1990s public-key certificate issuance has involved verifying users' identities and p...
With the advancement in Internet-based technologies, network applications are no longer just limited...
corresponding author Abstract. An optimized certificate-based protocol for mobile network with authe...
In this paper, we propose a lightweight physical layer aided authentication and key agreement (PL-AK...
In this paper, we propose a lightweight physical layer aided authentication and key agreement (PL-AK...
In recent years, the elliptic curve cryptosystems (ECC) have received attention due to their increas...
Wireless devices are characterized by low computational power and memory. Hence security protocols d...
A low-complexity, yet secure framework is proposed for protecting the Internet of Things (IoT) and f...
Internet of Things is a ubiquitous concept where physical objects are connected over the internet an...
This paper proposes a key exchange protocol with mutual authentication, which requires only 0.1 modu...
This paper proposes a novel authentication protocol for wireless access security. Current symmetric ...
Abstract Industry 4.0 has brought solutions for faster data accessibility, fault identification, pe...
The Internet of Things (IoT) consists of a range of devices that communicate with other devices that...
The Internet of Things (IoT), which can be regarded as an enhanced version of machine-to-machine com...
The Internet-of-Things (IoT) will connect different types of cyber physical systems that are support...
Since the early 1990s public-key certificate issuance has involved verifying users' identities and p...
With the advancement in Internet-based technologies, network applications are no longer just limited...
corresponding author Abstract. An optimized certificate-based protocol for mobile network with authe...
In this paper, we propose a lightweight physical layer aided authentication and key agreement (PL-AK...
In this paper, we propose a lightweight physical layer aided authentication and key agreement (PL-AK...
In recent years, the elliptic curve cryptosystems (ECC) have received attention due to their increas...
Wireless devices are characterized by low computational power and memory. Hence security protocols d...
A low-complexity, yet secure framework is proposed for protecting the Internet of Things (IoT) and f...
Internet of Things is a ubiquitous concept where physical objects are connected over the internet an...
This paper proposes a key exchange protocol with mutual authentication, which requires only 0.1 modu...
This paper proposes a novel authentication protocol for wireless access security. Current symmetric ...
Abstract Industry 4.0 has brought solutions for faster data accessibility, fault identification, pe...
The Internet of Things (IoT) consists of a range of devices that communicate with other devices that...