• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

使用时态逻辑对受限设备和低功耗广域网的声誉多因素认证机制进行形式化验证。

A Formal Verification of a Reputation Multi-Factor Authentication Mechanism for Constrained Devices and Low-Power Wide-Area Network Using Temporal Logic.

作者信息

Bezerra Wesley R, Martina Jean E, Westphall Carlos B

机构信息

Campus Universitário-Trindade, UFSC-Federal University of Santa Catarina, Florianópolis 88040-380, SC, Brazil.

出版信息

Sensors (Basel). 2023 Aug 3;23(15):6933. doi: 10.3390/s23156933.

DOI:10.3390/s23156933
PMID:37571715
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10422480/
Abstract

There are many security challenges in IoT, especially related to the authentication of restricted devices in long-distance and low-throughput networks. Problems such as impersonation, privacy issues, and excessive battery usage are some of the existing problems evaluated through the threat modeling of this work. A formal assessment of security solutions for their compliance in addressing such threats is desirable. Although several works address the verification of security protocols, verifying the security of components and their non-locking has been little explored. This work proposes to analyze the design-time security of the components of a multi-factor authentication mechanism with a reputation regarding security requirements that go beyond encryption or secrecy in data transmission. As a result, it was observed through temporal logic that the mechanism is deadlock-free and meets the requirements established in this work. Although it is not a work aimed at modeling the security mechanism, this document provides the necessary details for a better understanding of the mechanism and, consequently, the process of formal verification of its security properties.

摘要

物联网存在许多安全挑战,特别是与长距离和低吞吐量网络中受限设备的认证相关。诸如假冒、隐私问题和电池过度使用等问题是通过本工作的威胁建模评估的一些现有问题。对安全解决方案在应对此类威胁方面的合规性进行正式评估是很有必要的。尽管有几项工作涉及安全协议的验证,但对组件的安全性及其无锁定性的验证却很少有人探索。本工作建议分析一种多因素认证机制组件的设计时安全性,该机制具有超越数据传输中的加密或保密性的安全要求声誉。结果,通过时态逻辑观察到该机制无死锁且符合本工作中确立的要求。虽然这不是一项旨在对安全机制进行建模的工作,但本文档提供了必要的细节,以便更好地理解该机制,从而理解其安全属性的形式验证过程。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dbdd/10422480/18b604a857d2/sensors-23-06933-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dbdd/10422480/547a5e38baad/sensors-23-06933-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dbdd/10422480/a933d5d8111e/sensors-23-06933-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dbdd/10422480/4ad906d45d69/sensors-23-06933-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dbdd/10422480/e779e500cc78/sensors-23-06933-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dbdd/10422480/ae676d582bcd/sensors-23-06933-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dbdd/10422480/525ea770d3d3/sensors-23-06933-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dbdd/10422480/f20231e2e434/sensors-23-06933-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dbdd/10422480/bf096c0011a9/sensors-23-06933-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dbdd/10422480/8574bd80745b/sensors-23-06933-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dbdd/10422480/68dd6cb01fba/sensors-23-06933-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dbdd/10422480/b516d4ccd360/sensors-23-06933-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dbdd/10422480/54d84e55fec7/sensors-23-06933-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dbdd/10422480/07f6d8e8bcbd/sensors-23-06933-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dbdd/10422480/c6066d6bbde0/sensors-23-06933-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dbdd/10422480/18b604a857d2/sensors-23-06933-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dbdd/10422480/547a5e38baad/sensors-23-06933-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dbdd/10422480/a933d5d8111e/sensors-23-06933-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dbdd/10422480/4ad906d45d69/sensors-23-06933-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dbdd/10422480/e779e500cc78/sensors-23-06933-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dbdd/10422480/ae676d582bcd/sensors-23-06933-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dbdd/10422480/525ea770d3d3/sensors-23-06933-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dbdd/10422480/f20231e2e434/sensors-23-06933-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dbdd/10422480/bf096c0011a9/sensors-23-06933-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dbdd/10422480/8574bd80745b/sensors-23-06933-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dbdd/10422480/68dd6cb01fba/sensors-23-06933-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dbdd/10422480/b516d4ccd360/sensors-23-06933-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dbdd/10422480/54d84e55fec7/sensors-23-06933-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dbdd/10422480/07f6d8e8bcbd/sensors-23-06933-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dbdd/10422480/c6066d6bbde0/sensors-23-06933-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dbdd/10422480/18b604a857d2/sensors-23-06933-g015.jpg

相似文献

1
A Formal Verification of a Reputation Multi-Factor Authentication Mechanism for Constrained Devices and Low-Power Wide-Area Network Using Temporal Logic.使用时态逻辑对受限设备和低功耗广域网的声誉多因素认证机制进行形式化验证。
Sensors (Basel). 2023 Aug 3;23(15):6933. doi: 10.3390/s23156933.
2
Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments.用于多网关物联网环境的安全三因素认证协议
Sensors (Basel). 2019 May 22;19(10):2358. doi: 10.3390/s19102358.
3
Lightweight Payload Encryption-Based Authentication Scheme for Advanced Metering Infrastructure Sensor Networks.基于轻量级有效负载加密的高级计量基础设施传感器网络认证方案。
Sensors (Basel). 2022 Jan 11;22(2):534. doi: 10.3390/s22020534.
4
Can Formal Security Verification Really Be Optional? Scrutinizing the Security of IMD Authentication Protocols.正式的安全验证真的可以选择吗?对 IMD 身份验证协议安全性的审查。
Sensors (Basel). 2021 Dec 15;21(24):8383. doi: 10.3390/s21248383.
5
A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes.基于物联网的智能家居的安全轻量级认证协议。
Sensors (Basel). 2021 Feb 21;21(4):1488. doi: 10.3390/s21041488.
6
5G-AKA-FS: A 5G Authentication and Key Agreement Protocol for Forward Secrecy.5G-AKA-FS:一种用于前向保密的5G认证与密钥协商协议。
Sensors (Basel). 2023 Dec 27;24(1):159. doi: 10.3390/s24010159.
7
Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments.基于 PUF 的无人机物联网中可证明安全的相互认证和密钥协商方案。
Sensors (Basel). 2023 Feb 10;23(4):2034. doi: 10.3390/s23042034.
8
Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction.物联网中用于认证和授权的机器学习:分类法、挑战与未来研究方向
Sensors (Basel). 2021 Jul 28;21(15):5122. doi: 10.3390/s21155122.
9
Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications.车载通信中无线传感器网络的安全认证协议。
Sensors (Basel). 2018 Sep 21;18(10):3191. doi: 10.3390/s18103191.
10
A secure remote user authentication scheme for 6LoWPAN-based Internet of Things.基于 6LoWPAN 的物联网的安全远程用户认证方案。
PLoS One. 2021 Nov 8;16(11):e0258279. doi: 10.1371/journal.pone.0258279. eCollection 2021.

本文引用的文献

1
A Novel Model for Vulnerability Analysis through Enhanced Directed Graphs and Quantitative Metrics.通过增强有向图和定量指标进行脆弱性分析的新模型。
Sensors (Basel). 2022 Mar 9;22(6):2126. doi: 10.3390/s22062126.
2
Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey.基于区块链的物联网(IoT)中减轻分布式拒绝服务(DDoS)攻击的解决方案:一项综述。
Sensors (Basel). 2022 Jan 31;22(3):1094. doi: 10.3390/s22031094.
3
A Holistic Systems Security Approach Featuring Thin Secure Elements for Resilient IoT Deployments.
一种采用精简安全元件的整体系统安全方法,用于实现可靠的物联网部署。
Sensors (Basel). 2020 Sep 14;20(18):5252. doi: 10.3390/s20185252.
4
The Security of IP-Based Video Surveillance Systems.基于 IP 的视频监控系统的安全性。
Sensors (Basel). 2020 Aug 26;20(17):4806. doi: 10.3390/s20174806.