2018 10th International Conference on Information Technology and Electrical Engineering (ICITEE) 2018
DOI: 10.1109/iciteed.2018.8534855
|View full text |Cite
|
Sign up to set email alerts
|

Access Control on Internet of Things based on Publish/Subscribe using Authentication Server and Secure Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 25 publications
(12 citation statements)
references
References 11 publications
0
9
0
Order By: Relevance
“…Since it is developed to resource-constrained devices, it has limitations regarding data security, for example no data encryption is provided [ 55 ]. As shown in [ 41 , 55 ], the security in the connection between the IoT network and WSDB can be made, for instance, with secure sockets layer (SSL) certificate, or with its successor transport layer security (TLS) certificate, using authentication via the hypertext transfer protocol secure (HTTPS) [ 41 ], keeping the network protected against malicious attacks. In this case, public and trusted certificate authorities (CA) are used by the SSL/TLS to issue digital signed certificates when authenticating clients.…”
Section: Database-driven Iot-enabled Dsa Frameworkmentioning
confidence: 99%
See 2 more Smart Citations
“…Since it is developed to resource-constrained devices, it has limitations regarding data security, for example no data encryption is provided [ 55 ]. As shown in [ 41 , 55 ], the security in the connection between the IoT network and WSDB can be made, for instance, with secure sockets layer (SSL) certificate, or with its successor transport layer security (TLS) certificate, using authentication via the hypertext transfer protocol secure (HTTPS) [ 41 ], keeping the network protected against malicious attacks. In this case, public and trusted certificate authorities (CA) are used by the SSL/TLS to issue digital signed certificates when authenticating clients.…”
Section: Database-driven Iot-enabled Dsa Frameworkmentioning
confidence: 99%
“…In this case, public and trusted certificate authorities (CA) are used by the SSL/TLS to issue digital signed certificates when authenticating clients. In [ 55 ], these mechanisms have been employed for access control security; the security of the present framework can be implemented in the same way.…”
Section: Database-driven Iot-enabled Dsa Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…Begum et al, [17] propose a hybrid cryptography algorithm using One Time Pad, RSA, and DNA computing for text hiding and protection for attackers. Wardana and Perdana et al [18] propose an access control security system in IoT which uses MQTT protocol for communication and fog computing architecture.…”
Section: Literature Surveymentioning
confidence: 99%
“…Hackers who succeed in getting the user passwords from one platform can also stole the user data on another platforms. Therefore, password-based authentication cannot accommodate the security and confidentiality of account data [8,9,10].…”
Section: Introductionmentioning
confidence: 99%