Professional Documents
Culture Documents
Towards Continuous Authentication in Internet of Things Based On Secret Sharing Scheme
Towards Continuous Authentication in Internet of Things Based On Secret Sharing Scheme
K times k-1
Init.
1 1 - - - K+2 (each share)
(once) (once)
Our
Protocol
Verif.
1 1 - - - - - 2
Comm.
-
Init.
1 4 ECC 2 - - -
IoT-Ellipic encrypted
Curve
Verif.
- -
gen.
Sig.
- - - - -
Sig.
[20] K 1 1
Reader
RFID- 3 - - 5 EEC 3 - 1 2
Elliptic
Curve
2013 [22] - - - - - -
Tag
1 3
of each message in bytes. Storage costs refer to the memory & control-
requirements, in bytes, of the Verifier side as it is the weakest RSA 2014
Verif.
point in the protocol in terms of resources. The message size has [20] 1,104
been calculated according to the size of the parameters and
algorithms' outputs as recommended by the literature [30]. They RFID-
are as follows: Elliptic
reader