Computer Science &Amp; Information Technology (CS &Amp; IT) 2021
DOI: 10.5121/csit.2021.111103
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Security in Internet of Things Environment by Developing an Authentication Mechanism using COAP Protocol

Abstract: Internet of Things (IoT) has a huge attention recently due to its new emergence, benefits, and contribution to improving the quality of human lives. Securing IoT poses an open area of research, as it is the base of allowing people to use the technology and embrace this development in their daily activities. Authentication is one of the influencing security element of Information Assurance (IA), which includes confidentiality, integrity, and availability, non repudiation, and authentication. Therefore, there is… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 30 publications
0
1
0
Order By: Relevance
“…A multi-tiered implementation of an existing BC platform naturally characterized by a scaled throughput and low latency is introduced in [10] as an architecture built on Ethereum [11], leveraging its smart contracts [12]. A multi-tiered cellular network architecture proposed by [13] is based on clustering IoTDs and assigning cellular devices at the level above as local BCs to connect to cellular base stations situated at a top level as a global BC. The latter implements decentralized BC mechanisms.…”
Section: Literature Reviewmentioning
confidence: 99%
“…A multi-tiered implementation of an existing BC platform naturally characterized by a scaled throughput and low latency is introduced in [10] as an architecture built on Ethereum [11], leveraging its smart contracts [12]. A multi-tiered cellular network architecture proposed by [13] is based on clustering IoTDs and assigning cellular devices at the level above as local BCs to connect to cellular base stations situated at a top level as a global BC. The latter implements decentralized BC mechanisms.…”
Section: Literature Reviewmentioning
confidence: 99%