با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
A Secure Anonymous D2D Mutual Authentication and Key Agreement Protocol for IoT
پروتکل ایمن تأیید هویت متقابل D2D و قرارداد کلیدی برای اینترنت اشیا-2022 Internet of Things (IoT) is a developing technology in our time that is prone to security problems
as it uses wireless and shared networks. A challenging scenario in IoT environments is Device-to-
Device (D2D) communication where an authentication server, as a trusted third-party, does not
participate in the Authentication and Key Agreement (AKA) process and only cooperates in the
process of allocating and updating long-term secret keys. Various authentication protocols have
been suggested for such situations but have not been able to meet security and efficiency re-
quirements. This paper examined three related protocols and demonstrated that they failed to
remain anonymous and insecure against Key Compromise Impersonation (KCI) and clogging at-
tacks. To counter these pitfalls, a new D2D mutual AKA protocol that is anonymous, untraceable,
and highly secure was designed that needed no secure channel to generate paired private and
public keys in the registration phase. Formal security proof and security analysis using BAN logic,
Real-Or-Random (ROR) model, and Scyther tool showed that our proposed protocol satisfied
security requirements. The communication and computation costs and energy consumption
comparisons denoted that our design had a better performance than existing protocols. keywords: تأیید اعتبار و توافقنامه کلید (AKA) | ارتباط دستگاه به دستگاه (D2D) | اینترنت اشیا (IoT) | حمله جعل هویت کلیدی (KCI) | Authentication and Key Agreement (AKA) | Device to Device (D2D) communication | Internet of Things (IoT) | Key Compromise Impersonation (KCI) attack |
مقاله انگلیسی |
2 |
Provably secure biometric-based client–server secure communication over unreliable networks
ارتباطات امن مشتری و سرور مبتنی بر بیومتریک به طور قابل اطمینان در شبکه های غیرقابل اعتماد-2021 Due to rapid advancement in internet technologies, remote client access has become much more comfortable than in previous days. The responsibility of the system does not limit even after providing access to resources. In every system, there is a possibility that an adversary may use the resources of the system without prior authentication. This will create interruption, and the clients of the system will ultimately be affected, so the system must provide some authentication mechanism. Therefore, an authentication scheme needs to be introduced, which provides security against different attacks. Consequently, in this article, we propose a reliable and secure three factor authentication scheme that prevents various security attacks. The provable security of the proposed scheme is proved through a widely used random oracle model. We implemented the cryptographic operations of proposed and related schemes on a desktop system having good specifications to get the experimental results. Moreover, the presented scheme is compared with the existing schemes to compare its performance. The performance evaluation shows that our scheme is lightweight and efficient in terms of computation and communication costs as compared to related competing schemes. Keywords: Anonymity | Authentication | Impersonation attack | Session key | Smartcard |
مقاله انگلیسی |