{"title":"物联网属性验证器","authors":"M. Kamel, Yuping Yan, P. Ligeti, C. Reich","doi":"10.1109/ITNAC55475.2022.9998348","DOIUrl":null,"url":null,"abstract":"Identity management, authentication, and attribute verification are among the main concerns in many Internet of Things (IoT) applications. Considering the privacy concerns, attribute verification became more important in many applications. Many of the proposed models in this field suffer from privacy and scalability issues as they depend on a centralized entity. In this paper, we proposed a decentralized attribute verifier based on a challenge-response approach. To address various IoT attribute verification requirements, the proposed model provides two modes of attribute verification, namely 1-out-of-n verification and n-out-of-n verification modes, in which the participants can prove the nossession of one or all of the given target attributes.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Attribute Verifier for Internet of Things\",\"authors\":\"M. Kamel, Yuping Yan, P. Ligeti, C. Reich\",\"doi\":\"10.1109/ITNAC55475.2022.9998348\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Identity management, authentication, and attribute verification are among the main concerns in many Internet of Things (IoT) applications. Considering the privacy concerns, attribute verification became more important in many applications. Many of the proposed models in this field suffer from privacy and scalability issues as they depend on a centralized entity. In this paper, we proposed a decentralized attribute verifier based on a challenge-response approach. To address various IoT attribute verification requirements, the proposed model provides two modes of attribute verification, namely 1-out-of-n verification and n-out-of-n verification modes, in which the participants can prove the nossession of one or all of the given target attributes.\",\"PeriodicalId\":205731,\"journal\":{\"name\":\"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITNAC55475.2022.9998348\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITNAC55475.2022.9998348","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Identity management, authentication, and attribute verification are among the main concerns in many Internet of Things (IoT) applications. Considering the privacy concerns, attribute verification became more important in many applications. Many of the proposed models in this field suffer from privacy and scalability issues as they depend on a centralized entity. In this paper, we proposed a decentralized attribute verifier based on a challenge-response approach. To address various IoT attribute verification requirements, the proposed model provides two modes of attribute verification, namely 1-out-of-n verification and n-out-of-n verification modes, in which the participants can prove the nossession of one or all of the given target attributes.