Cargando…
Application of IoT Authentication Key Management Algorithm to Personnel Information Management
A new IoT authentication protocol is presented to address the security deficiencies in the Z-Wave protocol. The new protocol is based on Diameter and includes authentication/authorization module, billing module, and secure communication module. According to the characteristics of IoT devices, the re...
Autores principales: | Wang, Qing, Li, Haoran |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9050305/ https://www.ncbi.nlm.nih.gov/pubmed/35498183 http://dx.doi.org/10.1155/2022/4584072 |
Ejemplares similares
-
Ephemeral Keys Authenticated with Merkle Trees and Their Use in IoT Applications
por: Zajac, Pavol
Publicado: (2021) -
LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment
por: Wazid, Mohammad, et al.
Publicado: (2019) -
A Lightweight Authentication and Key Agreement Schemes for IoT Environments
por: Lee, Dae-Hwi, et al.
Publicado: (2020) -
IoT Registration and Authentication in Smart City Applications with Blockchain
por: Ferreira, Célio Márcio Soares, et al.
Publicado: (2021) -
An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks
por: Kim, Ki-Wook, et al.
Publicado: (2017)