Cargando…

Application of IoT Authentication Key Management Algorithm to Personnel Information Management

A new IoT authentication protocol is presented to address the security deficiencies in the Z-Wave protocol. The new protocol is based on Diameter and includes authentication/authorization module, billing module, and secure communication module. According to the characteristics of IoT devices, the re...

Descripción completa

Detalles Bibliográficos
Autores principales: Wang, Qing, Li, Haoran
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9050305/
https://www.ncbi.nlm.nih.gov/pubmed/35498183
http://dx.doi.org/10.1155/2022/4584072