Common use of Anonymity Clause in Contracts

Anonymity. Assume that an adversary overhears on wireless packet and spoofs the identities, e,g., XXXXx and connects to the NAN gateway, it does not send SMIDj as a plaintext but hide the identity in Q1 = ESTj [SMIDj , NID, T 1]. Moreover, it can be noticed from the proposed scheme that the pseudonymity of idSTj is being provided using α and β. Resultant, only the legitimate NAN gateway can learn the identity of meter by decrypting Q1 = ESTj [SMIDj , NID, T 1] using the secret token (STj). Thus, it achieves identity anonymity and protects from identity spoofing attack. In addition, the comparison on security services among [14], [17], [19]–[23] and the proposed scheme is given in Table II. We can notice that the proposed LAKA can provide more security services than previously proposed ones.

Appears in 4 contracts

Sources: Lightweight Authentication and Key Agreement, Lightweight Authentication and Key Agreement, Repository License Agreement