All Title Author
Keywords Abstract

Publish in OALib Journal
ISSN: 2333-9721
APC: Only $99

ViewsDownloads

GAP Universal One-Step Authentication Protocol

DOI: 10.4236/oalib.1108061, PP. 1-8

Subject Areas: Information and Communication: Security, Privacy, and Trust

Keywords: Authentication, Password, Entity, Event

Full-Text   Cite this paper   Add to My Lib

Abstract

IoT authentication involves not only people, but also things, requiring a universal authentication method. The core authentication technology is the subject authenticity proof, but the traditional proof method based on model reasoning or based on third party trust transferring cannot solve. Therefore, a truth authentication logic based on evidence is created. The Truth Logic is realized by digital signature, and proves the entity authenticity by identifier authentication and ontology authentication, forming a new concept of identifier authentication and proves the event authenticity by acceptance authentication and adoption authentication, where the acceptance authentication is composed of subject and ontology authentication, and the adoption authentication is composed of object authentication, because the acceptance process is always carried out before the acceptance process, thus forming a new concept of “proof before event”. Both entity authentication and event authentication are based on identifier authentication, so the GAP universal authentication protocol can be constructed to authenticate all entities in the Internet of Things and all events in the Internet of Events by single-step. As an example, GAP protocol gives the application on the network, a verifiable virtual network can be constituted by identifier authentication, proving traceability, preventing illegal access and DOS attack.

Cite this paper

Nan, X. (2021). GAP Universal One-Step Authentication Protocol. Open Access Library Journal, 8, e8061. doi: http://dx.doi.org/10.4236/oalib.1108061.

References

[1]  Nan, X.H. (2020) GAP One-Step Authentication Prtocol. Communications Techno- logy, 53, 3030-3033.
[2]  Brurros, M., Abadi, M. and Needham, R. (1989) A Logic of Authentication. ACM Transactions on Computer Systems, November 1989, 1-13. https://doi.org/10.1145/74850.74852
[3]  (2005) President’s Information Technology Advisory Committee. Cyber Security. A Crisis of Prioritization.
[4]  Nan, X.H. and Chen, Z. (2003) A Profile to Network Security. Defense Industry Publishing House, Beijing.
[5]  Department of Defense (DOD) (2021) Zero Trust Reference Architecture, Version 1.0.

Full-Text


comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679