{"title":"物联网中基于组的身份验证的性能改进研究","authors":"Wei-Tsung Su, W. Wong, Wei-Cheng Chen","doi":"10.1109/ICASI.2016.7539800","DOIUrl":null,"url":null,"abstract":"Although Internet of Thing (IoT) can be applied to many application domains by connecting all objects via Internet, security and privacy is one of the most concerns by users. In several applications, if the data is forged by attackers, it may incur unrecoverable disasters. Thus, device authentication must be supported in these security-sensitive applications. In this paper, a survey of group-based authentication (GBA) is conducted to support efficient device authentication in IoT. In addition, the performance improvement by GBA is evaluated and compared with the traditional direct authentication approach. According to the simulation results, GBA can significantly improve the performance of authentication process if the appropriate number of groups is determined.","PeriodicalId":170124,"journal":{"name":"2016 International Conference on Applied System Innovation (ICASI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":"{\"title\":\"A survey of performance improvement by group-based authentication in IoT\",\"authors\":\"Wei-Tsung Su, W. Wong, Wei-Cheng Chen\",\"doi\":\"10.1109/ICASI.2016.7539800\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Although Internet of Thing (IoT) can be applied to many application domains by connecting all objects via Internet, security and privacy is one of the most concerns by users. In several applications, if the data is forged by attackers, it may incur unrecoverable disasters. Thus, device authentication must be supported in these security-sensitive applications. In this paper, a survey of group-based authentication (GBA) is conducted to support efficient device authentication in IoT. In addition, the performance improvement by GBA is evaluated and compared with the traditional direct authentication approach. According to the simulation results, GBA can significantly improve the performance of authentication process if the appropriate number of groups is determined.\",\"PeriodicalId\":170124,\"journal\":{\"name\":\"2016 International Conference on Applied System Innovation (ICASI)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-05-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"14\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 International Conference on Applied System Innovation (ICASI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICASI.2016.7539800\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Applied System Innovation (ICASI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICASI.2016.7539800","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A survey of performance improvement by group-based authentication in IoT
Although Internet of Thing (IoT) can be applied to many application domains by connecting all objects via Internet, security and privacy is one of the most concerns by users. In several applications, if the data is forged by attackers, it may incur unrecoverable disasters. Thus, device authentication must be supported in these security-sensitive applications. In this paper, a survey of group-based authentication (GBA) is conducted to support efficient device authentication in IoT. In addition, the performance improvement by GBA is evaluated and compared with the traditional direct authentication approach. According to the simulation results, GBA can significantly improve the performance of authentication process if the appropriate number of groups is determined.