How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack
In Machine-to-Machine (M2M) communications, authentication of a device is of upmost importance for applications of Internet of Things. As traditional authentication schemes always assume the presence of a person, most authentication technologies cannot be applied in machine-centric M2M context. In t...
Saved in:
| Main Authors: | Wei Ren, Linchen Yu, Liangli Ma, Yi Ren |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2013-02-01
|
| Series: | International Journal of Distributed Sensor Networks |
| Online Access: | https://doi.org/10.1155/2013/679450 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Multi-user broadcast authentication scheme in wireless sensor networks with defending against DoS attacks
by: GUO Jiang-hong, et al.
Published: (2011-01-01) -
Multi-user broadcast authentication scheme in wireless sensor networks with defending against DoS attacks
by: GUO Jiang-hong, et al.
Published: (2011-01-01) -
Authenticity in S, M, L, XL scale of Thessaloniki
by: Sotiria Alexiadou
Published: (2025-07-01) -
Formal verification of security properties of the Lightweight Authentication and Key Exchange Protocol for Federated IoT devices
by: Michał Jarosz, et al.
Published: (2022-09-01) -
Fault attacks on authenticated encryption modes for GIFT
by: Shuai Liu, et al.
Published: (2022-01-01)