2013
DOI: 10.7840/kics.2013.38b.9.707
|View full text |Cite
|
Sign up to set email alerts
|

Mutual Authentication and Key Agreement Scheme between Lightweight Devices in Internet of Things

Abstract: Confidentiality, mutual authentication and message origin authentication are required to make a secure service in IoT.Security protocols used in traditional IP Networks cannot be directly adopted to resource constrained devices in IoT.Under the respect, a IETF standard group proposes to use lightweight version of DTLS protocol for supporting security services in IoT environments. However, the protocol can not cover up all of very constrained devices. To solve the problem, we propose a scheme which tends to sup… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0
4

Year Published

2015
2015
2019
2019

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 2 publications
0
4
0
4
Order By: Relevance
“…However, a sensor node must communicate with a base station to share a session key among sensor nodes and then with a key distribution center, which is an inconvenient process [14]. …”
Section: Methods For Device Authentication and Key Distribution Undermentioning
confidence: 99%
“…However, a sensor node must communicate with a base station to share a session key among sensor nodes and then with a key distribution center, which is an inconvenient process [14]. …”
Section: Methods For Device Authentication and Key Distribution Undermentioning
confidence: 99%
“…Framework technologies are then further divided into intellectual middleware, energy management, home networking, and information appliance technologies [28]. The descriptions of individual technologies are as follows: intellectual middleware technology is a core technology that should be installed on every device that constitutes a home network, including home platforms or home appliances for recommending a smart home automation service [29]. It utilizes the information entered by individuals together with circumstantial information when providing a custom service adjusted or provided at the optimal level in consideration of the concerns and circumstances of each user [30,31].…”
Section: Trend Of Communication In Smart Home Architecturementioning
confidence: 99%
“…또한 사물인터넷 환경에서 상호인증 및 세션 키 합의 기술 [6] , 초고층 대형 업무용 건물 중 인텔리전트 빌딩의 화 재 확대지연 통합 플랫폼의 요구사항 정의 및 구현 [7] , 태양광 발전 모니터링 시스템을 기존 모니터링 시스 템에 N스크린 기술을 적용 및 구현 [8] , 전자계량기 모 니터링 시스템을 전력선 통신과 인터넷 맵을 연동 구 현 [9] , 스마트 그리드 환경이 구축된 가정에서 발생하 는 가전기기 소비전력 패턴을 데이터 마이닝을 이용 하여 가족 유형 분류 등의 연구가 시행되었다 [10] . [11] .…”
Section: 이것과 관련된 연구로는 위치 기반 서비스 사용의 증 가에 따른 Gps로 인한 과도한 배터리 소모를 감소하unclassified