Cargando…
A novel IoT sensor authentication using HaLo extraction method and memory chip variability
Since the inception of encrypted messages thousands of years ago, mathematicians and scientists have continued to improve encryption algorithms in order to create more secure means of communication. These improvements came by means of more complex encryption algorithms that have stronger security fe...
Autores principales: | Gordon, Holden, Lyp, Thomas, Kimbro, Calvin, Tehranipoor, Sara |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer International Publishing
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8527440/ http://dx.doi.org/10.1007/s43926-021-00019-2 |
Ejemplares similares
-
PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices
por: Lee, JoonYoung, et al.
Publicado: (2022) -
Authentication technologies for cloud technology, IoT, and big data
por: Alginahi, Yasser M, et al.
Publicado: (2019) -
A Survey of Internet of Things (IoT) Authentication Schemes †
por: El-hajj, Mohammed, et al.
Publicado: (2019) -
DLT Based Authentication Framework for Industrial IoT Devices
por: Lupascu, Cristian, et al.
Publicado: (2020) -
IoT Registration and Authentication in Smart City Applications with Blockchain
por: Ferreira, Célio Márcio Soares, et al.
Publicado: (2021)