دانلود و نمایش مقالات مرتبط با Key agreement::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Key agreement

تعداد مقالات یافته شده: 18
ردیف عنوان نوع
1 A Secure Anonymous D2D Mutual Authentication and Key Agreement Protocol for IoT
پروتکل ایمن تأیید هویت متقابل D2D و قرارداد کلیدی برای اینترنت اشیا-2022
Internet of Things (IoT) is a developing technology in our time that is prone to security problems as it uses wireless and shared networks. A challenging scenario in IoT environments is Device-to- Device (D2D) communication where an authentication server, as a trusted third-party, does not participate in the Authentication and Key Agreement (AKA) process and only cooperates in the process of allocating and updating long-term secret keys. Various authentication protocols have been suggested for such situations but have not been able to meet security and efficiency re- quirements. This paper examined three related protocols and demonstrated that they failed to remain anonymous and insecure against Key Compromise Impersonation (KCI) and clogging at- tacks. To counter these pitfalls, a new D2D mutual AKA protocol that is anonymous, untraceable, and highly secure was designed that needed no secure channel to generate paired private and public keys in the registration phase. Formal security proof and security analysis using BAN logic, Real-Or-Random (ROR) model, and Scyther tool showed that our proposed protocol satisfied security requirements. The communication and computation costs and energy consumption comparisons denoted that our design had a better performance than existing protocols.
keywords: تأیید اعتبار و توافقنامه کلید (AKA) | ارتباط دستگاه به دستگاه (D2D) | اینترنت اشیا (IoT) | حمله جعل هویت کلیدی (KCI) | Authentication and Key Agreement (AKA) | Device to Device (D2D) communication | Internet of Things (IoT) | Key Compromise Impersonation (KCI) attack
مقاله انگلیسی
2 Certificateless Authenticated Key Agreement for Blockchain-Based WBANs
توافق نامه کلید معتبر گواهینامه برای WBAN های مبتنی بر بلاکچین -2019
Authenticated key agreement (AKA) enables communicating parties to mutually establish a session key, in a way that each entity is assured of the authentication of its peer. Certificateless AKA (CLAKA) protocols are widely designed since they avoid the key escrow problem found in identity-based systems and overcome certificateless management overheads in Public Key Infrastructure (PKI). Furthermore, the existing CLAKA were designed to operate in centralized network. Such architecture is a single point of management and single point of failure. We need lightweight protocols that fit with body sensors capabilities. In order to mitigate the aforementioned vulnerabilities, we propose a pairing-based certificateless against the key escrow problem. Our protocol operates in a decentralized system against the single point of failure and management. The protocol establishes a session key in the first phase for communications. The ring signature is used in the second phase for node authentication. The ring signature has advantage of reducing computation costs where a node signs a signature on behalf of others. The signing node remains anonymous and other nodes can verify the signature. Another advantage of ring signature is that there is no specification about the size of the group.
Keywords: WBAN | CLAKA | Session key | Blockchain | Ring signature
مقاله انگلیسی
3 An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach
رمزنگاری منحنی بیضوی مبتنی بر طرح احراز هویت متقابل برای ارتباطات شبکه هوشمند با استفاده از روش بیومتریک-2019
Smart grid (SG) provides a suitable adjustment in the amount of power generation by providing the ability to supervise consumer behavior. SG uses in the smart system to encourage cultural heritage because it is accountable for providing power without any interruption. SG is one of the vital components to authorize smart systems with a lot of smart features to attract visitors to come and visit heritage. In SG, environment security and privacy are the major concern for communications. An authentication protocol provides secure communication between users and service provider for security and privacy purpose. Several authentication protocols are available in the literature. However, they are enabled to known security attacks easily or they are not computationally efficient for SG communication. In the present paper, we design an ECC-based mutual authentication protocol for smart grid communication using biometric approach. The present framework satisfy various security features such as replay attack, user anonymity, man in the middle attack, key freshness, message authentication, session key agreement, impersonation attack, non-traceability and non-transferability. Further, the proposed protocol takes much less communication and computation costs compared with other existing protocols in SG environment. Therefore, our scheme is convenient for practical application in SG communication
Keywords: Biometric | Elliptic curve cryptography | Fuzzy extractor | Mutual authentication | Smart grid security and privacy
مقاله انگلیسی
4 Secure key agreement based on ordered biometric features
توافق نامه كليد امن براساس ويژگي هاي بيومتريك سفارش داده شده-2019
In this work, we propose a novel secure key agreement protocol, Secure Key Agreement using Pure Or- dered Biometrics (SKA-POB), in which the cryptographic keys are generated using an ordered set of bio- metrics, without any extra shared secret data or keys. The proposed approach is instantiated using iris biometrics. Our protocol makes use of hash functions and HMAC (Hash-based Message Authentication Code) as the only cryptographic primitives; thus, it is not cryptographically resource-hungry. We also propose and integrate a window-based comparison strategy and a window reset method in SKA-POB. This way, performance is maximized without sacrificing security. Furthermore, we propose an intelligent fake block generation and distribution strategy to hide the genuine blocks in transit, which increases the resistence of our proposed protocol against correlation attacks. SKA-POB protocol works in round manner, allowing to successfully terminate with key establishment as early as possible so that the complexity is reduced for both client and server sides. Additionally, we employ multi-criteria analyses for our proposed SKA-POB protocol and we provide verification results in terms of performance analysis together with randomness, distinctiveness and attack complexity through security analysis. Results show that highly random and computationally secure keys can be generated with almost no error and with very low com- plexity.
Keywords: Biometrics | Bio-cryptography | Iris | Key agreement | Security analysis
مقاله انگلیسی
5 SKA-PS: Secure key agreement protocol using physiological signals
SKA-PS: پروتکل توافق کلید امن با استفاده از سیگنال های فیزیولوژیکی-2019
In this paper, we propose SKA-PS, a novel Secure Key Agreement protocol using Physiological Signals, for Body Area Networks (BANs). Our protocol generates symmetric cryptographic keys using the physio- logical parameters derived from the physiological signals of the users, such as electrocardiogram, photo- plethysmogram and blood pressure. In our construction, we reduce the problem of secure key agreement into the problem of set reconciliation by representing the physiological parameter sequences generated from the physiological signals of the BAN users with appropriate sets. When properly selected param- eters are applied, biosensors of the same BAN user can agree on symmetric cryptographic keys with remarkably high true match and low false match rates (as much as 100% and 0.46% for pairwise execu- tion, and 100% and 0.26% for group execution, respectively), and low communication, computational and storage costs. We implemented our model in an embedded system, thus the results show real imple- mentation outcomes. Moreover, we comparatively analyze the performance of SKA-PS with two existing bio-cryptographic key agreement protocols and show that SKA-PS outperforms both in all performance metrics.
Keywords: Cryptographic key generation | Body area network security | Physiological signals | Key agreement | Bio-cryptography
مقاله انگلیسی
6 Enhanced authentication and key management scheme for securing data transmission in the internet of things
تصدیق پیشرفته و برنامه مدیریت کلیدی برای اطمینان از انتقال داده ها در اینترنت اشیا-2019
The Internet of Things (IoT), with its smartness and intelligence, is gradually changing human life by al- lowing everyday objects to be connected to the Internet. With the prevalence of the IoT, wireless sensor networks (WSNs) are attracting worldwide attention, because they cover a wide range of IoT applica- tions. The sensors collect data from the physical world and communicate with each other through wire- less links. Ensuring the security and privacy of WSNs’ communication is challenging. Recently, a secure authentication and key management scheme was proposed to secure data transmission in WSNs. In this paper, we show that this scheme has various security flaws, such as replay attack, denial of service attack, impersonation attack, and lack of mutual authentication and session key agreement. Then, we propose an enhanced scheme to overcome the identified security weaknesses. The security of the enhanced scheme is formally verified using the Burrows–Abadi–Needham logic and the Automated Validation of Internet Security Protocols and Applications tool. Our proposed scheme is more secure, efficient, and suitable for WSN-based IoT applications than recent related methods.
Keywords: Privacy | Mutual authentication | Key agreement | Elliptic curve cryptography | BAN logic | AVISPA
مقاله انگلیسی
7 Efficient utilization of elliptic curve cryptography in design of a three-factor authentication protocol for satellite communications
استفاده موثر از رمزنگاری منحنی بیضوی در طراحی پروتکل احراز هویت سه عاملی برای ارتباطات ماهواره ای-2019
Satellite communications are one of the significant methods of communications, which can be used in long distances and in conditions that the other means of communications cannot be operated. With the aid of the satellite communications, many services, such as video or voice calling, television, fax, Internet, and radio channels are prepared. So far, a number of authenticated key agreement protocols have been presented for satellite communications. However, they cannot totally provide the desired security requirements. For instance, in this paper, we show that a newly-published scheme does not resist the ephemeral secret leakage attack and does not provide perfect forward secrecy. Therefore, in order to address these security challenges, we suggest a three-factor elliptic curve cryptography based protocol that can withstand the well-known attacks with a comparable performance. To confirm the security of the proposed protocol, it has been formally analyzed using both automated validation of Internet security protocols and applications (AVISPA) tool and random oracle model. Furthermore, through a descriptive security analysis, we demonstrate that the presented scheme is safe and robust against various attacks. Eventually, to indicate the performance of the proposed protocol, a comparative efficiency analysis has been done besides an experimental evaluation on a suitable hardware. The results are indicative of the security and efficiency of the proposed protocol.
Keywords: Anonymity | AVISPA | ECC | Key agreement | Random oracle | Satellite communications | Security
مقاله انگلیسی
8 Architecture of security association establishment based on bootstrapping technologies for enabling secure IoT infrastructures
معماری ایجاد انجمن امنیتی مبتنی بر فن آوری خود راه برای فعال کردن زیرساخت های اینترنت اشیا امن-2019
The next generation of IoT scenarios must consider security aspects as a first class component. As a core aspect, key management is crucial for the establishment of security associations between endpoints. According to it, in this work we propose a novel architecture of security association establishment based on bootstrapping technologies in order to manage the life-cycle of cryptographic keys in IoT. Based on our previous work, we propose a key derivation process by using a lightweight bootstrapping mechanism specifically designed for IoT. Then, the derived cryptographic material is used as an authentication credential of the EDHOC protocol, which represents a standardization effort for key agreement in IoT. EDHOC is an application layer alternative to the DTLS handshake, in order to provide end-to-end security properties even in the presence of intermediate entities, such as proxies. Evaluation results prove the feasibility of our approach, which represents one of the first efforts to consider application layer security approaches for the IoT.
Keywords: Internet of things | Security management | Bootstrapping | EDHOC
مقاله انگلیسی
9 Provably secure authenticated key agreement scheme for distributed mobile cloud computing services
طرح توافقنامه کلیدی تأیید امن برای خدمات محاسبات ابری سیار توزیع شده-2017
With the rapid development of mobile cloud computing, the security becomes a crucial part of communication systems in a distributed mobile cloud computing environment. Recently, in 2015, Tsai and Lo proposed a privacy-aware authentication scheme for distributed mobile cloud computing services. In this paper, we first analyze the Tsai–Lo’s scheme and show that their scheme is vulnerable to server impersonation attack, and thus, their scheme fails to achieve the secure mutual authentication. In addition, we also show that Tsai–Lo’s scheme does not provide the session-key security (SK-security) and strong user credentials’ privacy when ephemeral secret is unexpectedly revealed to the adversary. In order to withstand these security pitfalls found in Tsai–Lo’s scheme, we propose a provably secure authentication scheme for distributed mobile cloud computing services. Through the rigorous security analysis, we show that our scheme achieves SK-security and strong credentials’ privacy and prevents all well-known attacks including the impersonation attack and ephemeral secrets leakage attack. Furthermore, we simulate our scheme for the formal security analysis using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool, and show that our scheme is secure against passive and active attacks including the replay and man-in-the-middle attacks. More security functionalities along with reduced computational costs for the mobile users make our scheme more appropriate for the practical applications as compared to Tsai–Lo’s scheme and other related schemes. Finally, to demonstrate the practicality of the scheme, we evaluate the proposed scheme using the broadly-accepted NS-2 network simulator.
Keywords: Cloud computing | SK-security | Mutual authentication | User untraceability | AVISPA | NS2 simulation
مقاله انگلیسی
10 A lightweight biometrics based remote user authentication scheme for IoT services
یک راهبرد تایید هویت کاربر مبتنی بر بیومتریک سبک برای خدمات IoT-2017
Article history:Available online 12 January 2017Keywords: Biometrics IoT servicesKey agreementRemote user authentication SecurityUser authentication is becoming crucial in the accelerating Internet of Things (IoT) environment. With IoT several applications and services have been emerging in the areas such as, surveillance, healthcare, security, etc. The services offered can be accessed through smart device applications by the user from anywhere, anytime and anyplace. This makes security and privacy critical to IoT. Moreover, security is paramount in IoT, to enable secure access to the services; multi-factor based authentication can provide high security. In this paper, a lightweight biometric based remote user authentication and key agreement scheme for secure access to IoT services has been proposed. The protocol makes use of lightweight hash operations and XOR operation. The security analysis proves that it is robust against multiple security at- tacks. The formal verification is performed using AVISPA tool, which confirms its security in the presence of a possible intruder.© 2017 Elsevier Ltd. All rights reserved.
Keywords: Biometrics | IoT services | Key agreement | Remote user authentication | Security
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 2469 :::::::: بازدید دیروز: 3084 :::::::: بازدید کل: 5553 :::::::: افراد آنلاین: 44