Impersonation Attack. To successfully perform this attack and forge IoT devices, the adversary needs to duplicate messages = ℎ( ∥ ∥ ∥ 1) and = ℎ( ∥ ∥ 2) to be certified by the shared protocol. An adversary can never generate a valid message to forge an authorized device in the network because it does not have access to private key and original . Our proposed protocol is able to withstand impersonation attack.
Appears in 1 contract
Sources: Research Article
Impersonation Attack. To successfully perform this attack and forge IoT devices, the adversary needs to duplicate messages 𝑍𝑖 = ℎ( ℎ(𝑇𝐼𝐷𝑖 ∥ 𝜏𝑖 ∥ 𝑀𝑖𝑄𝑗 ∥ 1𝑡1) and 𝑍𝑗 = ℎ( ℎ(𝑇𝐼𝐷𝑗 ∥ 𝑆𝐾𝑗 ∥ 2𝑡2) to be certified by the shared protocol. An adversary can never generate a valid message to forge an authorized device in the network because it does not have access to private key 𝑑𝑖 and original 𝐼𝐷𝑖 . Our proposed protocol is able to withstand impersonation attack.
Appears in 1 contract
Sources: Research Article