Cargando…
iAKA-CIoT: An Improved Authentication and Key Agreement Scheme for Cloud Enabled Internet of Things Using Physical Unclonable Function
The Internet of Things (IoT) with cloud services are important functionalities in the latest IoT systems for providing various convenient services. These cloud-enabled IoT environments collect, analyze, and monitor surrounding data, resulting in the most effective handling of large amounts of hetero...
Autores principales: | Park, Kisung, Park, Youngho |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9416611/ https://www.ncbi.nlm.nih.gov/pubmed/36016023 http://dx.doi.org/10.3390/s22166264 |
Ejemplares similares
-
Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks
por: Li, Zhen, et al.
Publicado: (2016) -
Free-Rider Games for Cooperative Spectrum Sensing and Access in CIoT Networks
por: Jiang, Kejian, et al.
Publicado: (2023) -
Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay
por: Hu, Hequn, et al.
Publicado: (2017) -
Robust and Efficient Authentication and Group–Proof Scheme Using Physical Unclonable Functions for Wearable Computing
por: Yu, Sungjin, et al.
Publicado: (2023) -
A Secure Lightweight Three-Factor Authentication Scheme for IoT in Cloud Computing Environment
por: Yu, SungJin, et al.
Publicado: (2019)