RESTful IoT Authentication Protocols [chapter]

H.V. Nguyen, L. Lo Iacono
2017 Mobile Security and Privacy  
We use ideas from game theory to improve two families of authentication protocols, namely password-based and manual authentication schemes. The protocols will be transformed so that even if an intruder attacks different protocol runs between honest nodes, its expected payoff will still be lower than when it does not attack. A rational intruder, who always tries to maximise its payoff, therefore has no incentive to attack any protocol run among trustworthy parties.
doi:10.1016/b978-0-12-804629-6.00010-9 fatcat:djjdlumeufcy3kbiniaf3jae3q