Identity authentication for edge devices based on zero‐trust architecture
Tóm tắt
Từ khóa
Tài liệu tham khảo
Eschenauer L, 2002, Security Protocols, 47
Kindervag J, 2010, No more chewy centers: introducing the zero trust model of information security, For Res, 3
WardR BeyerB.BeyondCorp: a new approach to enterprise security 2014.
TianY.Network security protection based on zero trust architecture. Information Technology and Informatization; 2020:154‐157.
ChenT HuangSH.Tree parity machine‐based one‐time password authentication schemes. Proceedings of the 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence); 2008:257‐261; IEEE.
HallerNM.The s/key (tm) one‐time password system. Proceedings of the Internet Society Symposium on Network and Distributed Systems; 1994:151‐157.
HallerN MetzC NesserP StrawM.A one‐time password system. Network Working Group Request for Comments. vol. 2289; 1998.
Yeh TC, 2002, A secure one‐time password authentication scheme using smart cards, IEICE Trans Commun, 85, 2515
GoyalV AbrahamA SanyalS HanSY.The N/R one time password system. Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05); 2005:733‐738; IEEE.
HallsteinsenS JorstadI Van ThanhD.Using the mobile phone as a security token for unified authentication. Proceedings of the 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007); 2007:68; IEEE.
Cui Z, 2020, A hybrid blockchain‐based identity authentication scheme for multi‐WSN, IEEE Trans Serv Comput, 13, 241
Zhang S, 2020, A heterogeneous IOT node authentication scheme based on hybrid blockchain and trust value, KSII Trans Internet Inf Syst, 14, 3615
Li JG, 2011, Practical group signature scheme with verifier‐local revocation, J Commun, 32, 67