Hanguang Luo1, Tao Zou1,*, Chunming Wu2, Dan Li3, Shunbin Li1, Chu Chu4
CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5031-5040, 2022, DOI:10.32604/cmc.2022.027118
- 21 April 2022
Abstract In the emerging Industrial Internet of Things (IIoT), authentication problems have become an urgent issue for massive resource-constrained devices because traditional costly security mechanisms are not suitable for them. The security protocol designed for resource-constrained systems should not only be secure but also efficient in terms of usage of energy, storage, and processing. Although recently many lightweight schemes have been proposed, to the best of our knowledge, they are unable to address the problem of privacy preservation with the resistance of Denial of Service (DoS) attacks in a practical way. In this paper, we propose More >