2013
DOI: 10.4028/www.scientific.net/amm.433-435.1752
|View full text |Cite
|
Sign up to set email alerts
|

Research on Data Security Technology in Internet of Things

Abstract: The Internet of Things is currently the most popular field of communication and information research directions. Their application in the amount of information involved, are extremely large amount of data. How to ensure the transmission efficiency of business information under the premise of improving networking applications data security to protect the user's privacy data will be particularly important. Paper uses a custom data packet encapsulation mechanism, reducing the overhead of data resources; another b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(17 citation statements)
references
References 4 publications
0
17
0
Order By: Relevance
“…As regards authentication, the approach presented in [18] makes use of a 90 custom encapsulation mechanism, namely smart business security IoT application Protocol -intelligent Service Security Application Protocol. It combines cross-platform communications with encryption, signature, and authentication, in order to improve IoT applications development capabilities by establishing a secure communication system among different things.…”
Section: Authentication and Confidentialitymentioning
confidence: 99%
“…As regards authentication, the approach presented in [18] makes use of a 90 custom encapsulation mechanism, namely smart business security IoT application Protocol -intelligent Service Security Application Protocol. It combines cross-platform communications with encryption, signature, and authentication, in order to improve IoT applications development capabilities by establishing a secure communication system among different things.…”
Section: Authentication and Confidentialitymentioning
confidence: 99%
“…Recent research studies have proposed different protocols for different purposes: Diffie-Hellman for key agreement protocol, RSA and Advanced Encryption Standard (AES) for achieving message confidentiality, and hash-based message authentication code (HMAC) for maintaining message integrity. Even though traditional public key infrastructure (PKI) is not considered suitable for the IoT due to computation and communication costs, recent studies have proposed a lightweight PKI within IoT use cases, including efficient message transmission to ensure privacy and security [37,38]. Such novel schemes using customized data encapsulation could reduce both computation and communication overhead, thereby making RSA encryption viable for the IoT.…”
Section: Rsa-based Authentication Schemes For the Iotmentioning
confidence: 99%
“…Several studies which concern IoT security focus on solving specific aspects such as authentication, confidentiality, integrity, and access control. For example, Zhao and Ling [13] improve authentication by using a custom encapsulation mechanism which combines cross-platform communication with encryption. Moreover, Kothmayr et al [14] introduce IoT's first fully implemented two-way authentication security scheme, which is based on Rivest-Shamir-Adleman (RSA) and designed for Internet Protocol version 6 (IPv6) over Low power Wireless Personal Area Networks 3 (6LoWPANs).…”
Section: Related Workmentioning
confidence: 99%