Gelişmiş Arama

Basit öğe kaydını göster

dc.contributor.authorRana, Minahil
dc.contributor.authorShafiq, Akasha
dc.contributor.authorAltaf, Izwa
dc.contributor.authorAlazab, Mamoun
dc.contributor.authorMahmood, Khalid
dc.contributor.authorChaudhry, Shehzad Ashraf
dc.contributor.authorBin Zikria, Yousaf
dc.date.accessioned2023-06-17T06:31:03Z
dc.date.available2023-06-17T06:31:03Z
dc.date.issued2021en_US
dc.identifier.issn0140-3664
dc.identifier.issn1873-703X
dc.identifier.urihttps://hdl.handle.net/11363/4889
dc.description.abstractWhile the 6G/IoT transition is on the cards, the real advantage of this transition can be realized only if the user privacy and security are guaranteed. The smartcard and password based authentication protocols can help the transition in a rapid way. However, due to insecurities and/or heavy computation, many such protocols cannot cope with the dynamic requirements of future generation networks. Recently, Kaul and Awasthi presented a robust and secure user authentication protocol based on resource friendly symmetric cryptography primitives. They declared that their introduced protocol is convenient, efficient, and secure for the applications in realworld. In contrast, this article describes that protocol of Kaul and Awasthi is not secure because an attacker can easily find the identity of a legal user that is being sent on the public channel. Further, by using the identity of a legitimate user, an attacker can impersonate himself as a legitimate user of the system and can enjoy the services given by the server. So, their protocol is susceptible to user impersonation attacks, and their claim of being secure is proven to be wrong. Therefore, we have extended their work and presented an upgraded scheme by ensuring secure communication over the entire channel. Moreover, our proposed scheme is safe not solely against user impersonation attack but also major security attacks with reasonable communication, computation, and storage costs and is a better candidate for deployment in 6G/IoT networks.en_US
dc.language.isoengen_US
dc.publisherELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDSen_US
dc.relation.isversionof10.1016/j.comcom.2020.11.002en_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 United States*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/us/*
dc.subjectAuthenticationen_US
dc.subject6G/IoT securityen_US
dc.subjectNetwork Securityen_US
dc.subjectUser impersonationen_US
dc.titleA secure and lightweight authentication scheme for next generation IoT infrastructureen_US
dc.typearticleen_US
dc.relation.ispartofComputer Communicationsen_US
dc.departmentMühendislik ve Mimarlık Fakültesien_US
dc.authoridhttps://orcid.org/0000-0002-1928-3704en_US
dc.authoridhttps://orcid.org/0000-0001-5046-7766en_US
dc.authoridhttps://orcid.org/0000-0002-9321-6956en_US
dc.authoridhttps://orcid.org/0000-0002-6570-5306en_US
dc.identifier.volume165en_US
dc.identifier.startpage85en_US
dc.identifier.endpage96en_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.contributor.institutionauthorChaudhry, Shehzad Ashraf


Bu öğenin dosyaları:

Thumbnail

Bu öğe aşağıdaki koleksiyon(lar)da görünmektedir.

Basit öğe kaydını göster

info:eu-repo/semantics/openAccess
Aksi belirtilmediği sürece bu öğenin lisansı: info:eu-repo/semantics/openAccess