2016
DOI: 10.1016/j.jnca.2016.01.016
|View full text |Cite
|
Sign up to set email alerts
|

A secure IoT management architecture based on Information-Centric Networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
40
1

Year Published

2017
2017
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 44 publications
(41 citation statements)
references
References 21 publications
0
40
1
Order By: Relevance
“…Currently, the CDN institutes a Peer-to-Peer network (P2P) technology to let nearby users directly exchange content with one another [52] to improve the data exchange throughput. However, the CDN uses legacy network technology, and there are shortcomings that require an extra service to obtain the information of the content [53]. Table 3 …”
Section: Service-oriented Networkmentioning
confidence: 99%
“…Currently, the CDN institutes a Peer-to-Peer network (P2P) technology to let nearby users directly exchange content with one another [52] to improve the data exchange throughput. However, the CDN uses legacy network technology, and there are shortcomings that require an extra service to obtain the information of the content [53]. Table 3 …”
Section: Service-oriented Networkmentioning
confidence: 99%
“…Agents are able to exchange data and cooperate on activities Such an independent system fits easily into cloud environment makes it able of independent actions as explained by Figure 1 showing that an agent has the ability to act directly on the environment. 12,13,15 In this article, we are presenting our design using this new IoT trend that we use to improve the health care and daily lives of old and dependent people. 17,18 In our case, one agent is used to model IoT attitude into the cloud and exchange data and commands with the device firmware.…”
Section: Figurementioning
confidence: 99%
“…Moreover, with the cloud technology, we can benefit of the data center style security, such as multifactor authentication and hardware security module. 12,13,15 In this article, we are presenting our design using this new IoT trend that we use to improve the health care and daily lives of old and dependent people. 3,20 In this perspective, new approaches based on the cloud and multiagent systems 16,17,19 are considered, to optimize operation and security features, one of the major concerns in the case of internet users.…”
Section: Figurementioning
confidence: 99%
See 2 more Smart Citations