عنوان فارسی مقاله: |
شناسایی (احرازهویت) همتا به همتا (نظیر به نظیر) برای سیستم های کوچک نهفته (تعبیه شده): یک روش صفر مبتنی بر دانش برای امنیت اینترنت اشیا |
عنوان انگلیسی مقاله: |
Peer to Peer Authentication for Small Embedded Systems A zero-knowledge-based approach to security for the Internet of Things |
چکیده
مقدمه
شواهد دانش صفر
پروتکل تبادل کلید دیفی-هلمن
پروتکل پیشنهادی
بهینه سازی پروتکل
تبادل کلیدی
ویژگی های عملکرد
نتیجه گیری و تحقیقات آینده
کلمات کلیدی :
[PDF]Embedding Security in Wireless Embedded Systems - CiteSeerXciteseerx.ist.psu.edu/viewdoc/download;jsessionid...?doi=10.1.1.137.6112...processing poses to embedded system architects, integrators, HW designers ... (peer authentication, privacy, data integrity, etc.). 2 Security Challenges in Embedded. System Design. While mathematicians, computer science theorists, standards com- mittees ... Mobility and a small form-factor result in an increased possi-.[PDF]Blockchain based trust & authentication for decentralized ... - arXivhttps://arxiv.org/pdf/1706.01730by A Moinet - 2017 - Cited by 1 - Related articlesJun 6, 2017 - of cryptographic authentication data and associate peer trust level, from the beginning to the end of the sensor network lifetime. ... name of Satoshi Nakamoto published a paper [5] deal- ing with a new decentralized peer-to-peer electronic cash system. This paper introduces the blockchain as a new.[PDF]Paper Title (use style: paper title) - ijritccwww.ijritcc.org/download/1429528713.pdfhave to set the secret as hard as possible. A method for peer-to peer authentication and encryption based on the Goldreich-Micali-Wigderson (GMW) graph isomorphism zero knowledge protocol and the Diffie-. Hellman key exchange [1] is a promising approach that can be implemented on the small embedded systems.