2018
DOI: 10.1109/access.2018.2806483
|View full text |Cite
|
Sign up to set email alerts
|

An Architecture for Accountable Anonymous Access in the Internet-of-Things Network

Abstract: With the rapid development of the Internet, more and more devices are being connected to the Internet, making up the Internet-of-Things (IoT). The accountability and privacy are two important but contradictory factors to ensure the security of IoT networks. How to provide an accountable anonymous access to IoT networks is a challenging task. Since the IoT network is largely driven by services, in this paper we propose a new and efficient architecture to achieve accountable anonymous access to IoT networks base… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 30 publications
(21 citation statements)
references
References 34 publications
0
21
0
Order By: Relevance
“…In the environment of high real-time performance and extensive data in the edge computing network, there are still problems such as insufficient timeliness and complicated calculation when an Complexity abnormality is discovered [12,40]. In the new attacks, such as APT, there is an important feature that is multipoint and multitarget attack, which is different from traditional ones [13][14][15]. In response to the intrusion detection problem of this type of attack, Qi [16] proposed a distributed intelligent detection model based on multiagent.…”
Section: Related Researchmentioning
confidence: 99%
See 2 more Smart Citations
“…In the environment of high real-time performance and extensive data in the edge computing network, there are still problems such as insufficient timeliness and complicated calculation when an Complexity abnormality is discovered [12,40]. In the new attacks, such as APT, there is an important feature that is multipoint and multitarget attack, which is different from traditional ones [13][14][15]. In response to the intrusion detection problem of this type of attack, Qi [16] proposed a distributed intelligent detection model based on multiagent.…”
Section: Related Researchmentioning
confidence: 99%
“…strategy (10) end (11) else (12) ere is no optimal strategy. (13) end (14) end (15) else (16) if (υ > 1 − τ) ∧ (τ > (μβ/(ρα + μβ − εβ)))then (17) executes…”
Section: Security Analysis Of Glidementioning
confidence: 99%
See 1 more Smart Citation
“…Early experts finding mainly uses information retrieval techniques, 3 mining experts who meet the requirements using specific terms. Early experts finding mainly uses information retrieval techniques, 3 mining experts who meet the requirements using specific terms.…”
Section: Related Workmentioning
confidence: 99%
“…Social networking research began in the 1990s of the past 20th century, and since then, experts finding research has gained some success. Early experts finding mainly uses information retrieval techniques, 3 mining experts who meet the requirements using specific terms. More and more research methods came into being with the in-depth research of expert.…”
Section: Related Workmentioning
confidence: 99%