Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD-ROM 2016
DOI: 10.1145/2994551.2994555
|View full text |Cite
|
Sign up to set email alerts
|

AoT

Abstract: The consumer electronics industry is witnessing a surge in Internet of Things (IoT) devices, ranging from mundane artifacts to complex biosensors connected across disparate networks. As the demand for IoT devices grows, the need for stronger authentication and access control mechanisms is greater than ever. Legacy authentication and access control mechanisms do not meet the growing needs of IoT. In particular, there is a dire need for a holistic authentication mechanism throughout the IoT device life-cycle, na… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 52 publications
(9 citation statements)
references
References 76 publications
0
9
0
Order By: Relevance
“…Instead, public keys must be explicitly made public by their owners. Besides, certificateless is also based on expensive bilinear pairings 42 …”
Section: Authentication Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Instead, public keys must be explicitly made public by their owners. Besides, certificateless is also based on expensive bilinear pairings 42 …”
Section: Authentication Methodsmentioning
confidence: 99%
“…Their solution seeks to provide long‐term security by adding protocols to replace or update cryptographic material securely. More recently, Neto et al 42 have proposed an authentication solution for smart homes based on IBC and ABC. ABC is used to enforce an attribute‐based access control system, where users, via their smartphones, can access home appliances based on their attributes.…”
Section: Authentication For Iot Applicationsmentioning
confidence: 99%
“…The overarching objective of our work (the verification of authentic interactions within WPANs) is largely motivated by past work in authentication [8,12,18,22,27,31,[36][37][38][40][41][42]. Authentication is a process to verify (i.e., establish the truth of) an attribute value claimed by or for a system entity [50].…”
Section: Authenticationmentioning
confidence: 99%
“…Compared with the traditional cryptosystem, the greatest advantage of IBC is that it has no certificate, is easy to use and manage, and can easily achieve data encryption, identity authentication and other security services. Therefore, IBC has unique advantage in ensuring the data security of the Internet of Things, which can save overall cost substantially and effectively support the needs of identity authentication, data security, transmission security, access control, etc., in the application process of the Internet of things [39].…”
Section: Identifier Of Objectmentioning
confidence: 99%