Journal of Xidian University ›› 2021, Vol. 48 ›› Issue (3): 188-196.doi: 10.19665/j.issn1001-2400.2021.03.023
• Cyberspace Security • Previous Articles Next Articles
LI Xinghua1(),CAI Jueping2(),LI Xiaolong1(),WANG Feng1(),YAN Zhenhua1()
Received:
2020-10-13
Online:
2021-06-20
Published:
2021-07-05
CLC Number:
LI Xinghua,CAI Jueping,LI Xiaolong,WANG Feng,YAN Zhenhua. T-NTRU IoT dynamic access authentication technology[J].Journal of Xidian University, 2021, 48(3): 188-196.
[1] |
LIU X T, ZHANG T, HU N, et al. The Method of Internet of Things Access and Network Communication Based on MQTT[J]. Computer Communications, 2020,153:169-176.
doi: 10.1016/j.comcom.2020.01.044 |
[2] |
FRUSTACI M, PACE P, ALOI G, et al. Evaluating Critical Security Issues of the IoT World:Present and Future Challenges[J]. IEEE Internet of Things Journal, 2018,5(4):2483-2495.
doi: 10.1109/JIoT.6488907 |
[3] |
XIE Y, WU L B, KUMAR N, et al. Analysis and Improvement of a Privacy-Aware Handover Authentication Scheme for Wireless Network[J]. Wireless Personal Communications, 2017,93(2):523-541.
doi: 10.1007/s11277-016-3352-3 |
[4] | HE D B, WANG D, XIE Q, et al. Anonymous Handover Authentication Protocol for Mobile Wireless Networks with Conditional Privacy Preservation[J]. Science in China Series F:Information Sciences, 2017,60(5):52104. |
[5] | 钦豪, 张勇军, 陈佳琦, 等. 泛在电力物联网发展形态与挑战[J], 电力系统自动化, 2020,44(1):13-22. |
QIN Hao, ZHANG Yongjun, CHEN Jiaqi, et al. Development Formsand Challenges of Ubiquitous Power Internet of Things[J]. Automation of Electric Power Systems, 2020,44(1):13-22. | |
[6] | 王海峰, 李朝阳, 吕政, 等. 泛在电力物联网环境下网络安全攻击研究[J]. 浙江电力, 2019,38(12):76-81. |
WANG Haifeng, LI Chaoyang, LV Zheng, et al. Researchon Network Security Attack in Ubiquitous Power Internet of Things[J]. ZheJiang Electric Power, 2019,38(12):76-81. | |
[7] |
SHOR P W. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer[J]. SIAM Review, 1999,41(2):303-332.
doi: 10.1137/S0036144598347011 |
[8] |
XIE Y, WU L, KUMAR N, et al. Analysis and Improvement of a Privacy-Aware Handover Authentication Scheme for Wireless Network[J]. Wireless Personal Communications, 2017,93(2):523-541.
doi: 10.1007/s11277-016-3352-3 |
[9] |
DING XJ, DING F, CHEN X S, et al. Security-Reliability Tradeoff for Multi-Terminal Multi-Mode Coexisting Systems in the Presence of Multiple Eavesdroppers[J]. IET Communications, 2020,14(8):1221-1227.
doi: 10.1049/cmu2.v14.8 |
[10] | HOFFSTEIN J, PIPHER J, SILVERMAN J H. NTRU:a Ring-Based Public Key Cryptosystem[C]// Proceedings of the 3rd International Symposium on Algorithmic Number Theory.Heidelberg:Springer, 1998: 267-288. |
[11] |
CHEN R, PENG D Z. A Novel NTRU-Based Handover Authentication Scheme for Wireless Networks[J]. IEEE Communications Letters, 2018,22(3):586-589.
doi: 10.1109/LCOMM.2017.2786228 |
[12] |
HARN L, LIN C L. Authenticated Group Key Transfer Protocol Based on Secret Sharing[J]. IEEE Transactions on Computers, 2010,59(6):842-846.
doi: 10.1109/TC.2010.40 |
[13] |
WANG Q X, CHENG C, ZUO L. Analysis and Improvement of a NTRU-Based Handover Authentication Scheme[J]. IEEE Communications Letters, 2019,23(10):1692-1695.
doi: 10.1109/COML.4234 |
[14] |
GORBENKO I D. Analysis,Assessment and Proposals Regarding the Method for Generation of System Parameters in NTRU-Like Asymmetric Systems[J]. Telecommunications and Radio Engineering, 2017,76(6):511-520.
doi: 10.1615/TelecomRadEng.v76.i6 |
[15] | 喻小宝, 谭忠富, 屈高强. 基于能源互联网的电力商业模式及关键技术研究[J]. 智慧电力, 2019,47(2):9-14. |
YU Xiaobao, TAN Zhongfu, QU Gaoqiang. Researchon Power Business Model and Key Technologies Based on Energy Internet[J]. Smart Power, 2019,47(2):9-14. | |
[16] | 谢忠良, 江凌云. 一种基于NTRU算法的物联网设备接入认证方案[J]. 南京邮电大学学报, 2019,39(3):98-103. |
XIE Zhongliang, JIANG Lingyun. An Internetof Things Access Authentication Scheme Based on NTRU Algorithm[J]. Journal of Nanjing University of Post and Telecommunications, 2019,39(3):98-103. | |
[17] |
CHANG C C, WU H L, SUN C Y. Notes on Secure Authentication Scheme for IoT and Cloud Servers[J]. Pervasive and Mobile Computing, 2017,38:275-278.
doi: 10.1016/j.pmcj.2015.12.003 |
[18] | LoRa Alliance.LoRa WAN Sepcification:LoRa WANTM Sepecification 3[S/OL]. [2020-10-03]. https://www.lora-alliance.org/lor-awan-for-developers. |
[19] | WANG Y P E, LIN X Q, ADHIKARY A, et al. A Primer on 3GPP Narrowband Internet of Things[J]. IEEE Communications Magazine, 2017,55(3):117-123. |
[20] | 3GPP Technical Specification Group. Revised WID for Furter Enhancal MTC for LTE:3GPP RP-161464[S/OL]. [2020-10-03]. http://www.3gpp.org,accessed Apr.30,2017. |
[1] | CHEN Rong,XU Hongli,YANG Dongxue,HUANG Hua. Dense three-dimensional reconstruction algorithm based on spatially encoded structured light [J]. Journal of Xidian University, 2021, 48(6): 123-130. |
[2] | LIU Yunrui,ZHOU Shuisheng. Application of least squares loss in the multi-view learning algorithm [J]. Journal of Xidian University, 2021, 48(6): 151-160. |
[3] | ZHANG Chunxiang,ZHOU Xuesong,GAO Xueyao,LIU Huan. Semi-supervised word sense disambiguation by combining k-means clustering and the LSTM network [J]. Journal of Xidian University, 2021, 48(6): 161-171. |
[4] | LI Yuan,CUI Yushuang,WANG Wei. Method for the analysis of text sentiment based on the word dual-channel network [J]. Journal of Xidian University, 2021, 48(6): 179-186. |
[5] | DAI Mingjun,LI Xiaofeng,DENG Haiyan,CHEN Bin. Private information retrieval with low encoding/decoding complexity [J]. Journal of Xidian University, 2021, 48(6): 212-220. |
[6] | TAN Wen,GAN Xinbiao,BAI Hao,XIAO Tiaojie,CHEN Xuguang,LEI Shumeng,LIU Jie. Optimization of large-scale graph traversal for supercomputers [J]. Journal of Xidian University, 2021, 48(6): 84-95. |
[7] | GU Zhaojun,CHEN Hui,WANG Jialiang,GAO Bing. Target tracking control algorithm for small size quad-rotor helicopter [J]. Journal of Xidian University, 2021, 48(5): 117-127. |
[8] | DONG Ruchan,JIAO Licheng,ZHAO Jin,SHEN Weiyan. Application of the deep fusion mechanism in object detection of remote sensing images [J]. Journal of Xidian University, 2021, 48(5): 128-138. |
[9] | WANG Haijun,ZHANG Shengyan,DU Yujie. UAV object tracking via the correlation filter with the response divergence constraint [J]. Journal of Xidian University, 2021, 48(5): 149-155. |
[10] | ZHANG Yuhao,CHENG Peitao,ZHANG Shuhao,WANG Xiumei. Lightweight image super-resolution with the adaptive weight learning network [J]. Journal of Xidian University, 2021, 48(5): 15-22. |
[11] | CHENG De,HAO Yi,ZHOU Jingyu,WANG Nannan,GAO Xinbo. Cross-modality person re-identification utilizing the hybrid two-stream neural networks [J]. Journal of Xidian University, 2021, 48(5): 190-200. |
[12] | SUN Yanjing,WEI Li,ZHANG Nianlong,YUN Xiao,DONG Kaiwen,GE Min,CHENG Xiaozhou,HOU Xiaofeng. Person re-identification method combining the DD-GAN and Global feature in a coal mine [J]. Journal of Xidian University, 2021, 48(5): 201-211. |
[13] | YAN Jia,CAO Yudong,REN Jiaxing,CHEN Donghao,LI Xiaohui. Deep asymmetric compression Hashing algorithm [J]. Journal of Xidian University, 2021, 48(5): 212-221. |
[14] | TIAN Chunna,YE Yanyu,SHAN Xiao,DING Yuxuan,ZHANG Xiangnan. Survey of self-supervised video representation learning [J]. Journal of Xidian University, 2021, 48(5): 222-230. |
[15] | WANG Junjun,SUN Yue,LI Ying. Cloud removal method for the remote sensing image based on the GAN [J]. Journal of Xidian University, 2021, 48(5): 23-29. |
|