Elliptic curve-based query authentication protocol for iot devices aided by blockchain

HIGHLIGHTS

SUMMARY

    An important aspect regarding the security of a system that embraces IoT devices is the IoT devices themselves, as they can be a sensitive component of the system. In, the 4 of 18 authors involve the physical layer of the IoT system within the authentication process and the process of authentication involves hyperelliptic curves. Even if an attacker captures a query authentication and saves it for later use, or even if the IoT device stores the current query authentication, it cannot be used for further authentication queries because every time the IoT device computes . . .

     

    Logo ScioWire Beta black

    If you want to have access to all the content you need to log in!

    Thanks :)

    If you don't have an account, you can create one here.

     

Scroll to Top

Add A Knowledge Base Question !

+ = Verify Human or Spambot ?