Common use of Impersonation Attack Clause in Contracts

Impersonation Attack. To successfully perform this attack and forge IoT devices, the adversary needs to duplicate messages = ℎ( ∥ ∥ ∥ 1) and = ℎ( ∥ ∥ 2) to be certified by the shared protocol. An adversary can never generate a valid message to forge an authorized device in the network because it does not have access to private key and original . Our proposed protocol is able to withstand impersonation attack.

Appears in 1 contract

Sources: Research Article

Impersonation Attack. To successfully perform this attack and forge IoT devices, the adversary needs to duplicate messages 𝑍𝑖 = ℎ( ℎ(𝑇𝐼𝐷𝑖 𝜏𝑖 𝑀𝑖𝑄𝑗 1𝑡1) and 𝑍𝑗 = ℎ( ℎ(𝑇𝐼𝐷𝑗 𝑆𝐾𝑗 2𝑡2) to be certified by the shared protocol. An adversary can never generate a valid message to forge an authorized device in the network because it does not have access to private key 𝑑𝑖 and original 𝐼𝐷𝑖 . Our proposed protocol is able to withstand impersonation attack.

Appears in 1 contract

Sources: Research Article