Knowledge (XXG)

Mutual authentication

Source đź“ť

367:(WBAN) that transmit data through radio frequencies. This is beneficial for patients that should not be disturbed while being monitored, and can reduced the workload for medical worker and allow them to focus on the more hands-on jobs. However, a large concern for healthcare providers and patients about using remote health data tracking is that sensitive patient data is being transmitted through unsecured channels, so authentication occurs between the medical body area network user (the patient), the Healthcare Service Provider (HSP) and the trusted third party. 329:(IoT), where physical objects are incorporated into the Internet and can communicate via IP address. Authentication schemes can be applied to many types of systems that involve data transmission. As the Internet's presence in mechanical systems increases, writing effective security schemes for large numbers of users, objects, and servers can become challenging, especially when needing schemes to be lightweight and have low computational costs. Instead of password-based authentication, devices will use 72:(IoT). Writing effective security schemes in IoT systems is challenging, especially when schemes are desired to be lightweight and have low computational costs. Mutual authentication is a crucial security step that can defend against many adversarial attacks, which otherwise can have large consequences if IoT systems (such as e-Healthcare servers) are hacked. In scheme analyses done of past works, a lack of mutual authentication had been considered a weakness in data transmission schemes. 260:, which allows quick access to large amounts of data, but sometimes large amounts of data can slow down communication. Even with edge-based cloud computing, which is faster than general cloud computing due to a closer proximity between the server and user, lightweight schemes allow for more speed when managing larger amounts of data. One solution to keep schemes lightweight during the mutual authentication process is to limit the number of 428:(UAV) systems, a platform authentication occurs rather than user authentication. Mutual authentication during vehicle communication prevents one vehicle's system from being breached, which can then affect the whole system negatively. For example, a system of drones can be employed for agriculture work and cargo delivery, but if one drone were to be breached, the whole system has the potential to collapse. 271:(D2D) communication, where multiple devices can communicate locally in close proximities, removes the third party network. This in turn can speed up communication time. However, the authentication still occurs through insecure channels, so researchers believe it is still important to ensure mutual authentication occurs in order to keep a secure scheme. 249:, adding a mutual authentication step to data transmissions protocols can often increase performance runtime and computational costs. This can become an issue for network systems that cannot handle large amounts of data or those that constantly have to update for new real-time data (e.g. location tracking, real-time health data). 215:, and the authentication of the client to the server is left to the application layer. TLS also offers client-to-server authentication using client-side X.509 authentication. As it requires provisioning of the certificates to the clients and involves less user-friendly experience, it's rarely used in end-user applications. 359:
Similarly, an alternate RFID tag and reader system that assigns designated readers to tags has been proposed for extra security and low memory cost. Instead of considering all tag readers as one entity, only certain readers can read specific tags. With this method, if a reader is breached, it will
174:
A replay attack is similar to a MITM attack in which older messages are replayed out of context to fool the server. However, this does not work against schemes using mutual authentication because timestamps are a verification factor that are used in the protocols. If the change in time is greater
165:
or intercept a message, and sometimes alter the intended message for the recipient. The two parties openly receive messages without verifying the sender, so they do not realize an adversary has inserted themselves into the communication line. Mutual authentication can prevent MITM attacks because
286:
because the password is human-made rather than a computer-generated certificate. While applications could simply require users to use a computer-generated password, it is inconvenient for people to remember. User-made passwords and the ability to change one's password are important for making an
351:(RFID) tags are commonly used for object detection, which many manufacturers are implementing into their warehouse systems for automation. This allows for a faster way to keep up with inventory and track objects. However, keeping track of items in a system with RFID tags that transmit data to a 316:
have grown more popular over password-based schemes because it is more difficult to copy or guess session keys when using biometrics, but it can be difficult to encrypt noisy data. Due to these security risks and limitations, schemes can still employ mutual authentication regardless of how many
287:
application user-friendly, so many schemes work to accommodate the characteristic. Researchers note that a password based protocol with mutual authentication is important because user identities and passwords are still protected, as the messages are only readable to the two parties involved.
194:
Impersonation attacks refer to malicious attacks where a user or individual pretends to be an authorized user to gain unauthorized access to a system while feigning permission. When each party authenticates the other, they send each other a certificate that only the other party knows how to
355:
increases the chances of security risks, as there are now more digital elements to keep track of. A three way mutual authentication can occur between RFID tags, the tag readers, and the cloud network that stores this data in order to keep RFID tag data secure and unable to be manipulated.
222:(B2B) applications, where a limited number of programmatic and homogeneous clients are connecting to specific web services, the operational burden is limited, and security requirements are usually much higher as compared to consumer environments. 401:(MEC) is considered to be an improved, more lightweight fog-cloud computing networking system, and can be used for medical technology that also revolves around location-based data. Due to the large physical range required of locational tracking, 89:, they will both authenticate the other and verify that it is who they are expecting to communicate with before any data or messages are transmitted. A mutual authentication process that exchanges user IDs may be implemented as follows: 187:
or be identified as someone else. Mutual authentication can prevent spoofing attacks because the server will authenticate the user as well, and verify that they have the correct session key before allowing any further communication and
603:
Amin, Ruhul; Islam, SK Hafizul; Vijayakumar, Pandi; Khan, Muhammad Khurram; Chang, Victor (2018). "A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication".
140:(BAN logic) is a well regarded and widely accepted method to use, because it verifies that a message came from a trustworthy entity. BAN logic first assumes an entity is not to be trusted, and then will verify its legality. 290:
However, a negative aspect about password-based authentication is that password tables can take up a lot of memory space. One way around using a lot of memory during a password-based authentication scheme is to implement
80:
Schemes that have a mutual authentication step may use different methods of encryption, communication, and verification, but they all share one thing in common: each entity involved in the communication is verified. If
131:
At this point, both parties are verified to be who they claim to be and safe for the other to communicate with. Lastly, Alice and Bob will create a shared secret key so that they can continue communicating in a secure
1097:
Karuppiah, Marimuthu; Das, Ashok Kumar; Li, Xiong; Kumari, Saru; Wu, Fan; Chaudhry, Shehzad Ashraf; Niranchana, R. (2019). "Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment".
360:
not affect the whole system. Individual readers will communicate with specific tags during mutual authentication, which runs in constant time as readers use the same private key for the authentication process.
303:
Recently, more schemes have higher level authentication than password based schemes. While password-based authentication is considered as "single-factor authentication," schemes are beginning to implement
195:
unscramble, verifying themselves as a trusted source. In this way, adversaries cannot use impersonation attacks because they do not have the correct certificate to act as if they are the other party.
416:, keeping data about the car and its surrounding states secure. By authenticating the fog nodes and the vehicle, vehicular handoff becomes a safe process and the car’s system is safe from hackers. 295:(OTP), which is a password sent to the user via SMS or email. OTPs are time-sensitive, which means that they will expire after a certain amount of time and that memory does not need to be stored. 648:
Chen, Chin-Ling; Chiang, Mao-Lun; Hsieh, Hui-Ching; Liu, Ching-Cheng; Deng, Yong-Yuan (2020). "A Lightweight Mutual Authentication with Wearable Device in Location-Based Mobile Edge Computing".
379:
are another way to store patient data collected remotely. Clouds are useful for storing large amounts of data, such as medical information, that can be accessed by many devices whenever needed.
518:
Chen, Liquan; Qian, Sijie; Lim, Ming; Wang, Shihui (2018). "An enhanced direct anonymous attestation scheme with mutual authentication for network-connected UAV communication systems".
166:
both the sender and recipient verify each other before sending them their message keys, so if one of the parties is not verified to be who they claim they are, the session will end.
312:) or biometric-based (three-factor) authentication schemes. Smart cards are simpler to implement and easy for authentication, but still have risks of being tampered with. 199:
Mutual authentication also ensures information integrity because if the parties are verified to be the correct source, then the information received is reliable as well.
175:
than the maximum allowed time delay, the session will be aborted. Similarly, messages can include a randomly generated number to keep track of when a message was sent.
1233:
Anandhi, S.; Anitha, R.; Sureshkumar, Venkatasamy (2020). "An Authentication Protocol to Track an Object with Multiple RFID Tags Using Cloud Computing Environment".
391:
is one way that has been proposed to mutually authenticate the user to the database, by authenticating with the main mediBchain node and keeping patient anonymity.
894:
Narwal, Bhawna; Mohapatra, Amar Kumar (2020). "SEEMAKA: Secured Energy-Efficient Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks".
754:
Sasikaladevi, N.; Malathi, D. (2019). "Energy Efficient Lightweight Mutual Authentication Protocol (REAP) for MBAN Based on Genus-2 Hyper-Elliptic Curve".
688:
Sahoo, Shreeya Swagatika; Mohanty, Sujata; Majhi, Banshidhar (2020). "Improved Biometric-Based Mutual Authentication and Key Agreement Scheme Using ECC".
387:(TMIS), an important way for medical patients to receive healthcare remotely, can ensure secured data with mutual authentication verification schemes. 1359:
Liu, Xiaoxue; Ma, Wenping; Cao, Hao (2019). "NPMA: A Novel Privacy-Preserving Mutual Authentication in TMIS for Mobile Edge-Cloud Architecture".
558:
Jan, Mian Ahmad; Khan, Fazlullah; Alam, Muhammad; Usman, Muhammad (2019). "A payload-based mutual authentication scheme for Internet of Things".
274:
Schemes may sacrifice a better runtime or storage cost when ensuring mutual authentication in order to prioritize protecting the sensitive data.
282:
In mutual authentication schemes that require a user's input password as part of the verification process, there is a higher vulnerability to
1062:
Karuppiah, Marimuthu; Saravanan, R. (2015). "Cryptanalysis and an Improvement of New Remote Mutual Authentication Scheme using Smart Cards".
137: 424:
Many systems that do not require a human user as part of the system also have protocols that mutually authenticate between parties. In
1413: 460:
Chen, Yulei; Chen, Jianhua (2020). "A secure three-factor-based authentication with key agreement protocol for e-Health clouds".
397:
is a networking system that can handle large amounts of data, but still has limitations regarding computational and memory cost.
252:
Thus, it becomes a desired characteristic of many mutual authentication schemes to have lightweight properties (e.g. have a low
1408: 848:
Melki, Reem; Noura, Hassan N.; Chehab, Ali (2020). "Lightweight multi-factor mutual authentication protocol for IoT devices".
348: 53:
Mutual authentication is a desired characteristic in verification schemes that transmit sensitive data, in order to ensure
409:
that track patient health data can be used to call the nearest hospital if the patient shows a negative change in vitals.
309: 27: 1309:"MBPA: A Medibchain-Based Privacy-Preserving Mutual Authentication in TMIS for Mobile Medical Cloud Architecture" 1269: 726: 208: 156: 47: 425: 35: 796:"A Mutual Authentication Scheme for Secure Fog Computing Service Handover in Vehicular Network Environment" 330: 62: 1171:"MAKE-IT—A Lightweight Mutual Authentication and Key Exchange Protocol for Industrial Internet of Things" 398: 39: 1320: 1182: 1009: 807: 413: 219: 149: 341:
Mutual authentication can be satisfied in radio network schemes, where data transmissions through
1384: 1338: 1289: 1250: 1115: 1079: 911: 865: 825: 771: 705: 665: 621: 585: 535: 485: 437: 384: 326: 246: 184: 118:
Alice checks the format and timestamp. If either is incorrect or invalid, the session is aborted.
93:
Alice sends an message encrypted with Bob's public key to Bob to show that Alice is a valid user.
69: 183:
Spoofing attacks rely on using false data to pose as another user in order to gain access to a
99:
Bob checks the format and timestamp. If either is incorrect or invalid, the session is aborted.
1376: 1210: 1037: 946: 477: 364: 292: 212: 1368: 1328: 1281: 1242: 1200: 1190: 1149: 1107: 1071: 1027: 1017: 938: 903: 857: 815: 763: 697: 657: 613: 575: 567: 527: 469: 268: 253: 256:) in order to accommodate the system that is storing a lot of data. Many systems implement 376: 352: 342: 257: 178: 57:. Mutual authentication can be accomplished with two types of credentials: usernames and 1324: 1186: 1013: 998:"Mutual Authentication Protocol for D2D Communications in a Cloud-Based E-Health System" 811: 1205: 1170: 1032: 997: 230: 31: 1402: 1388: 1342: 1293: 1254: 915: 869: 829: 775: 709: 669: 489: 394: 226: 169: 162: 86: 82: 54: 1119: 1083: 965: 625: 589: 539: 43: 1075: 571: 363:
Many e-Healthcare systems that remotely monitor patient health data use wireless
124:
Alice checks if the message matches a valid user. If not, the session is aborted.
1333: 1308: 1169:
Choudhary, Karanjeet; Gaba, Gurjot Singh; Butun, Ismail; Kumar, Pardeep (2020).
820: 795: 1246: 930: 907: 861: 767: 701: 661: 473: 105:
Bob checks if the message matches a valid user. If not, the session is aborted.
1372: 1285: 1111: 942: 617: 406: 388: 313: 305: 950: 481: 531: 152:
because it can protect communications against adversarial attacks, notably:
1380: 1214: 1041: 1270:"Privacy-Preserving Mutual Authentication in RFID with Designated Readers" 405:
can send data to the edge of the cloud to store data. An application like
380: 121:
Then, the message is decrypted with Alice's secret key, giving Bob's ID.
58: 580: 102:
The message is then decrypted with Bob's secret key, giving Alice's ID.
1195: 1022: 1154: 1137: 283: 1138:"Two-factor authentication using biometric based quantum operations" 211:
protocol only proves the identity of the server to the client using
161:
Man-in-the-middle (MITM) attacks are when a third party wishes to
1268:
Guo, Fuchun; Mu, Yi; Susilo, Willy; Varadharajan, Vijay (2017).
325:
Mutual authentication is often found in schemes employed in the
234: 136:
To verify that mutual authentication has occurred successfully,
112:
Bob sends Alice a message back to show that Bob is a valid user.
261: 38:. It is a default mode of authentication in some protocols ( 402: 1064:
Journal of Discrete Mathematical Sciences and Cryptography
966:"The Transport Layer Security (TLS) Protocol Version 1.2" 218:
Mutual TLS authentication (mTLS) is more often used in
16:
Two parties authenticating each other at the same time
245:
While lightweight schemes and secure schemes are not
727:"Mutual TLS: Securing Microservices in Service Mesh" 345:
are secure after verifying the sender and receiver.
996:g. Lopes, Ana Paula; Gondim, Paulo R. L. (2020). 321:Certificate based schemes and system applications 68:Mutual authentication is often employed in the 850:International Journal of Information Security 8: 1307:Liu, Xiaoxue; Ma, Wenping; Cao, Hao (2019). 1136:Sharma, Mohit Kr; Nene, Manisha J. (2020). 931:"HCI for Cybersecurity, Privacy and Trust" 1332: 1204: 1194: 1153: 1031: 1021: 819: 794:Dewanta, Favian; Mambo, Masahiro (2019). 579: 412:Fog node networks can be implemented in 449: 241:Lightweight schemes vs. secured schemes 1354: 1352: 1228: 1226: 1224: 1131: 1129: 1057: 1055: 1053: 1051: 991: 989: 987: 985: 889: 887: 885: 883: 881: 879: 843: 841: 839: 721: 719: 553: 551: 549: 455: 453: 7: 789: 787: 785: 749: 747: 683: 681: 679: 643: 641: 639: 637: 635: 513: 511: 509: 507: 505: 503: 501: 499: 333:to verify each other's identities. 560:Future Generation Computer Systems 438:Two types of Mutual Authentication 317:authentication factors are added. 34:each other at the same time in an 14: 935:Lecture Notes in Computer Science 606:Multimedia Tools and Applications 267:Applications that solely rely on 1274:Wireless Personal Communications 1235:Wireless Personal Communications 1100:Mobile Networks and Applications 896:Wireless Personal Communications 756:Wireless Personal Communications 690:Wireless Personal Communications 650:Wireless Personal Communications 420:Machine to machine verification 148:Mutual authentication supports 349:Radio frequency identification 76:Process steps and verification 1: 1076:10.1080/09720529.2015.1013693 462:The Journal of Supercomputing 229:-based applications based on 929:Moallem, Abbas, ed. (2021). 572:10.1016/j.future.2017.08.035 115:Alice verifies the message: 1334:10.1109/ACCESS.2019.2947313 964:Dierks, Tim (August 2008). 821:10.1109/ACCESS.2019.2931217 299:Multi-factor authentication 264:used during communication. 237:, via systems like SPIFFE. 138:Burrows-Abadi-Needham logic 1430: 1361:Journal of Medical Systems 1247:10.1007/s11277-020-07330-1 908:10.1007/s11277-020-07304-3 862:10.1007/s10207-019-00484-5 768:10.1007/s11277-019-06693-4 702:10.1007/s11277-019-06897-8 662:10.1007/s11277-020-07240-2 474:10.1007/s11227-020-03395-8 85:wants to communicate with 46:) and optional in others ( 1373:10.1007/s10916-019-1444-9 1286:10.1007/s11277-017-4430-x 1112:10.1007/s11036-018-1061-8 943:10.1007/978-3-030-77392-2 618:10.1007/s11042-017-4996-z 28:two-factor authentication 26:(not to be confused with 157:Man-in-the-middle attack 30:) refers to two parties 1414:Computer access control 532:10.1109/CC.2018.8387987 426:unmanned aerial vehicle 63:public key certificates 36:authentication protocol 1409:Authentication methods 278:Password-based schemes 96:Bob verifies message: 24:two-way authentication 399:Mobile edge computing 371:Cloud based computing 225:mTLS is also used in 191:Impersonation attacks 150:zero trust networking 20:Mutual authentication 1142:Security and Privacy 520:China Communications 220:business-to-business 1325:2019IEEEA...7n9282L 1187:2020Senso..20.5166C 1014:2020Senso..20.2072G 812:2019IEEEA...7j3095D 395:Fog-cloud computing 385:Information Systems 612:(9): 11041–11066. 365:body area networks 327:Internet of Things 293:one-time passwords 247:mutually exclusive 213:X.509 certificates 70:Internet of Things 1319:: 149282–149298. 1196:10.3390/s20185166 1023:10.3390/s20072072 806:: 103095–103114. 343:radio frequencies 1421: 1393: 1392: 1356: 1347: 1346: 1336: 1304: 1298: 1297: 1280:(3): 4819–4845. 1265: 1259: 1258: 1241:(4): 2339–2361. 1230: 1219: 1218: 1208: 1198: 1166: 1160: 1159: 1157: 1155:10.1002/spy2.102 1133: 1124: 1123: 1106:(3): 1046–1062. 1094: 1088: 1087: 1059: 1046: 1045: 1035: 1025: 993: 980: 979: 977: 976: 961: 955: 954: 926: 920: 919: 902:(4): 1985–2008. 891: 874: 873: 845: 834: 833: 823: 791: 780: 779: 762:(4): 2471–2488. 751: 742: 741: 739: 738: 723: 714: 713: 685: 674: 673: 645: 630: 629: 600: 594: 593: 583: 555: 544: 543: 515: 494: 493: 468:(4): 3359–3380. 457: 269:device-to-device 254:memory footprint 1429: 1428: 1424: 1423: 1422: 1420: 1419: 1418: 1399: 1398: 1397: 1396: 1358: 1357: 1350: 1306: 1305: 1301: 1267: 1266: 1262: 1232: 1231: 1222: 1168: 1167: 1163: 1135: 1134: 1127: 1096: 1095: 1091: 1061: 1060: 1049: 995: 994: 983: 974: 972: 963: 962: 958: 928: 927: 923: 893: 892: 877: 847: 846: 837: 793: 792: 783: 753: 752: 745: 736: 734: 725: 724: 717: 696:(2): 991–1017. 687: 686: 677: 647: 646: 633: 602: 601: 597: 557: 556: 547: 517: 516: 497: 459: 458: 451: 446: 434: 422: 373: 339: 323: 301: 280: 258:cloud computing 243: 207:By default the 205: 179:Spoofing attack 146: 78: 17: 12: 11: 5: 1427: 1425: 1417: 1416: 1411: 1401: 1400: 1395: 1394: 1348: 1299: 1260: 1220: 1161: 1125: 1089: 1070:(5): 623–649. 1047: 981: 970:tools.ietf.org 956: 921: 875: 856:(6): 679–694. 835: 781: 743: 715: 675: 631: 595: 545: 495: 448: 447: 445: 442: 441: 440: 433: 432:External links 430: 421: 418: 414:car automation 372: 369: 338: 337:Radio networks 335: 322: 319: 300: 297: 279: 276: 242: 239: 204: 201: 197: 196: 192: 189: 181: 176: 172: 167: 159: 145: 142: 134: 133: 129: 128: 127: 126: 125: 119: 113: 110: 109: 108: 107: 106: 100: 94: 77: 74: 32:authenticating 15: 13: 10: 9: 6: 4: 3: 2: 1426: 1415: 1412: 1410: 1407: 1406: 1404: 1390: 1386: 1382: 1378: 1374: 1370: 1366: 1362: 1355: 1353: 1349: 1344: 1340: 1335: 1330: 1326: 1322: 1318: 1314: 1310: 1303: 1300: 1295: 1291: 1287: 1283: 1279: 1275: 1271: 1264: 1261: 1256: 1252: 1248: 1244: 1240: 1236: 1229: 1227: 1225: 1221: 1216: 1212: 1207: 1202: 1197: 1192: 1188: 1184: 1180: 1176: 1172: 1165: 1162: 1156: 1151: 1147: 1143: 1139: 1132: 1130: 1126: 1121: 1117: 1113: 1109: 1105: 1101: 1093: 1090: 1085: 1081: 1077: 1073: 1069: 1065: 1058: 1056: 1054: 1052: 1048: 1043: 1039: 1034: 1029: 1024: 1019: 1015: 1011: 1007: 1003: 999: 992: 990: 988: 986: 982: 971: 967: 960: 957: 952: 948: 944: 940: 936: 932: 925: 922: 917: 913: 909: 905: 901: 897: 890: 888: 886: 884: 882: 880: 876: 871: 867: 863: 859: 855: 851: 844: 842: 840: 836: 831: 827: 822: 817: 813: 809: 805: 801: 797: 790: 788: 786: 782: 777: 773: 769: 765: 761: 757: 750: 748: 744: 732: 731:The New Stack 728: 722: 720: 716: 711: 707: 703: 699: 695: 691: 684: 682: 680: 676: 671: 667: 663: 659: 655: 651: 644: 642: 640: 638: 636: 632: 627: 623: 619: 615: 611: 607: 599: 596: 591: 587: 582: 577: 573: 569: 566:: 1028–1039. 565: 561: 554: 552: 550: 546: 541: 537: 533: 529: 525: 521: 514: 512: 510: 508: 506: 504: 502: 500: 496: 491: 487: 483: 479: 475: 471: 467: 463: 456: 454: 450: 443: 439: 436: 435: 431: 429: 427: 419: 417: 415: 410: 408: 407:smart watches 404: 400: 396: 392: 390: 386: 382: 378: 375:e-Healthcare 370: 368: 366: 361: 357: 354: 350: 346: 344: 336: 334: 332: 328: 320: 318: 315: 311: 307: 298: 296: 294: 288: 285: 277: 275: 272: 270: 265: 263: 259: 255: 250: 248: 240: 238: 236: 232: 228: 227:microservices 223: 221: 216: 214: 210: 202: 200: 193: 190: 186: 182: 180: 177: 173: 171: 170:Replay attack 168: 164: 160: 158: 155: 154: 153: 151: 143: 141: 139: 130: 123: 122: 120: 117: 116: 114: 111: 104: 103: 101: 98: 97: 95: 92: 91: 90: 88: 84: 75: 73: 71: 66: 64: 60: 56: 55:data security 51: 49: 45: 41: 37: 33: 29: 25: 21: 1364: 1360: 1316: 1312: 1302: 1277: 1273: 1263: 1238: 1234: 1181:(18): 5166. 1178: 1174: 1164: 1145: 1141: 1103: 1099: 1092: 1067: 1063: 1005: 1001: 973:. Retrieved 969: 959: 934: 924: 899: 895: 853: 849: 803: 799: 759: 755: 735:. Retrieved 733:. 2021-02-01 730: 693: 689: 653: 649: 609: 605: 598: 581:10453/117906 563: 559: 526:(5): 61–76. 523: 519: 465: 461: 423: 411: 393: 374: 362: 358: 353:cloud server 347: 340: 331:certificates 324: 302: 289: 281: 273: 266: 251: 244: 224: 217: 206: 198: 147: 135: 79: 67: 52: 23: 19: 18: 1367:(10): 318. 1313:IEEE Access 1008:(7): 2072. 800:IEEE Access 656:: 575–598. 403:5G networks 1403:Categories 975:2016-04-22 737:2021-02-20 444:References 389:Blockchain 314:Biometrics 310:two-factor 306:smart card 1389:202570185 1343:204863294 1294:207264759 1255:219070999 951:0302-9743 916:216529906 870:209340123 830:199509951 776:204084523 710:208125038 670:218934756 490:221146362 482:0920-8542 163:eavesdrop 59:passwords 1381:31522286 1215:32927788 1120:64720667 1084:62591965 1042:32272675 626:13674284 590:57380203 540:49333360 383:Medical 381:Telecare 233:such as 231:runtimes 144:Defenses 1321:Bibcode 1206:7570918 1183:Bibcode 1175:Sensors 1033:7181216 1010:Bibcode 1002:Sensors 808:Bibcode 284:hackers 188:access. 132:manner. 1387:  1379:  1341:  1292:  1253:  1213:  1203:  1118:  1082:  1040:  1030:  949:  914:  868:  828:  774:  708:  668:  624:  588:  538:  488:  480:  377:clouds 185:server 61:, and 1385:S2CID 1339:S2CID 1290:S2CID 1251:S2CID 1148:(3). 1116:S2CID 1080:S2CID 912:S2CID 866:S2CID 826:S2CID 772:S2CID 706:S2CID 666:S2CID 622:S2CID 586:S2CID 536:S2CID 486:S2CID 83:Alice 1377:PMID 1211:PMID 1038:PMID 947:ISSN 478:ISSN 262:bits 235:Dapr 203:mTLS 1369:doi 1329:doi 1282:doi 1243:doi 1239:113 1201:PMC 1191:doi 1150:doi 1108:doi 1072:doi 1028:PMC 1018:doi 939:doi 904:doi 900:113 858:doi 816:doi 764:doi 760:109 698:doi 694:111 658:doi 654:113 614:doi 576:hdl 568:doi 528:doi 470:doi 209:TLS 87:Bob 50:). 48:TLS 44:SSH 40:IKE 22:or 1405:: 1383:. 1375:. 1365:43 1363:. 1351:^ 1337:. 1327:. 1315:. 1311:. 1288:. 1278:96 1276:. 1272:. 1249:. 1237:. 1223:^ 1209:. 1199:. 1189:. 1179:20 1177:. 1173:. 1144:. 1140:. 1128:^ 1114:. 1104:24 1102:. 1078:. 1068:18 1066:. 1050:^ 1036:. 1026:. 1016:. 1006:20 1004:. 1000:. 984:^ 968:. 945:. 937:. 933:. 910:. 898:. 878:^ 864:. 854:19 852:. 838:^ 824:. 814:. 802:. 798:. 784:^ 770:. 758:. 746:^ 729:. 718:^ 704:. 692:. 678:^ 664:. 652:. 634:^ 620:. 610:77 608:. 584:. 574:. 564:92 562:. 548:^ 534:. 524:15 522:. 498:^ 484:. 476:. 466:77 464:. 452:^ 65:. 42:, 1391:. 1371:: 1345:. 1331:: 1323:: 1317:7 1296:. 1284:: 1257:. 1245:: 1217:. 1193:: 1185:: 1158:. 1152:: 1146:3 1122:. 1110:: 1086:. 1074:: 1044:. 1020:: 1012:: 978:. 953:. 941:: 918:. 906:: 872:. 860:: 832:. 818:: 810:: 804:7 778:. 766:: 740:. 712:. 700:: 672:. 660:: 628:. 616:: 592:. 578:: 570:: 542:. 530:: 492:. 472:: 308:(

Index

two-factor authentication
authenticating
authentication protocol
IKE
SSH
TLS
data security
passwords
public key certificates
Internet of Things
Alice
Bob
Burrows-Abadi-Needham logic
zero trust networking
Man-in-the-middle attack
eavesdrop
Replay attack
Spoofing attack
server
TLS
X.509 certificates
business-to-business
microservices
runtimes
Dapr
mutually exclusive
memory footprint
cloud computing
bits
device-to-device

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑