2021
DOI: 10.1155/2021/9921036
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Authentication for Internet of Things Devices in Information Management Systems

Abstract: With the rapid development of the Internet of Things (IoT) technology, it has been widely used in various fields. IoT device as an information collection unit can be built into an information management system with an information processing and storage unit composed of multiple servers. However, a large amount of sensitive data contained in IoT devices is transmitted in the system under the actual wireless network environment will cause a series of security issues and will become inefficient in the scenario wh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 26 publications
0
0
0
Order By: Relevance
“…The conventional network communication data transmission methods are susceptible to internal and external transmission attacks. Therefore, the network communication data security transmission method designed by the author has formulated an effective network communication data security transmission protocol based on the transmission information of each node in the network communication [6,7]. The protocol designed by the author uses the principle of information bundling to resist unknown information transmission theft attacks.…”
Section: Develop Secure Transmission Protocols For Network Communicat...mentioning
confidence: 99%
“…The conventional network communication data transmission methods are susceptible to internal and external transmission attacks. Therefore, the network communication data security transmission method designed by the author has formulated an effective network communication data security transmission protocol based on the transmission information of each node in the network communication [6,7]. The protocol designed by the author uses the principle of information bundling to resist unknown information transmission theft attacks.…”
Section: Develop Secure Transmission Protocols For Network Communicat...mentioning
confidence: 99%
“…The transmitted data between devices can be intercepted by malicious parties and result in sensitive information leakage. One of the issues from a privacy perspective is that there are various privacy policies for different IoT devices communicating with each other, which require each device to verify the privacy policies of other devices before transmitting the data [4]. Although there are possible security controls such as encryption to protect data in transit, isolation of the network where devices reside, and privileged remote access to segmented networks that can mitigate the attack surfaces, there is still a gap in the security and privacy of IoT systems that requires to be addressed to preclude threats and attacks to each layer of IoT architecture.…”
Section: Introductionmentioning
confidence: 99%