2021
DOI: 10.30837/itssi.2021.18.031
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Support Procedures for Asymmetric Authentication of the Internet of Things

Abstract: Subject of research: procedures of asymmetric authentication of Internet of Things nodes to ensure the highest level of security using cryptographic chips. The aim of the article is to study the ways of potential use of cryptographic chips to ensure secure authentication of Internet of Things sites using asymmetric cryptography procedures. The article solves the following tasks: analysis of hardware support technologies for asymmetric cryptography of the Internet of Things; definition of secure procedures for … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…Chips use. That may be implicit, when it utilizes material physical characteristics to enhance authentication, such as physical unclonable functions [71]-[76], or explicit, where it utilizes chips that save and treat keys utilized for authentication.…”
Section: Taxonomy Of Iot Authentication Protocolsmentioning
confidence: 99%
“…Chips use. That may be implicit, when it utilizes material physical characteristics to enhance authentication, such as physical unclonable functions [71]-[76], or explicit, where it utilizes chips that save and treat keys utilized for authentication.…”
Section: Taxonomy Of Iot Authentication Protocolsmentioning
confidence: 99%
“…In addition, Malamas, Dasaklis, Voutsinas, and Kotzanikolaou [6,7], [8,9] have explored the integration of blockchain architecture as a service layer into existing ERP systems, improving access control and data integrity to enhance interoperability between supply chain stakeholders. This proposal reflects the growing trend of using distributed ledger technologies to ensure data integrity and trust in IoT ecosystems, addressing issues related to data tampering and unauthorized access.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Let us introduce some conventions and mathematical relations, which, by analogy with the broadband digital communication systems discussed above, will allow us to study the features of construction and information exchange in a steganosystem [11][12][13].…”
Section: Direct Spectrum Expansion In Steganographymentioning
confidence: 99%