2019 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE) 2019
DOI: 10.1109/chase48038.2019.00022
|View full text |Cite
|
Sign up to set email alerts
|

A Key Management Scheme for Establishing an Encryption-Based Trusted IoT System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…All cluster heads and end-users should use Datagram Transport Layer Security (DTLS) for secure communication after acquiring X.509 certificates issued by a common certificate of authority, primarily managed by end-users and cluster heads due to their resource capability. Over an Internet of Things cloud channel, resource-rich network entities first communicate with the common CA [ 41 ]. Suppose an end-user wants to talk to an IoT node in a particular cluster.…”
Section: Various Communication Links In Iot Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…All cluster heads and end-users should use Datagram Transport Layer Security (DTLS) for secure communication after acquiring X.509 certificates issued by a common certificate of authority, primarily managed by end-users and cluster heads due to their resource capability. Over an Internet of Things cloud channel, resource-rich network entities first communicate with the common CA [ 41 ]. Suppose an end-user wants to talk to an IoT node in a particular cluster.…”
Section: Various Communication Links In Iot Networkmentioning
confidence: 99%
“…All cluster heads and end-users should use Datagram Transport Layer Security (DTLS) for secure communication after acquiring X.509 certificates issued by a common certificate of authority, primarily managed by end-users and cluster heads due to their All cluster heads and end-users should use Datagram Transport Layer Security (DTLS) for secure communication after acquiring X.509 certificates issued by a common certificate of authority, primarily managed by end-users and cluster heads due to their resource capability. Over an Internet of Things cloud channel, resource-rich network entities first communicate with the common CA [41]. Suppose an end-user wants to talk to an IoT node in a particular cluster.…”
mentioning
confidence: 99%