메뉴 건너뛰기




Volumn 8, Issue 16, 2015, Pages 2678-2686

A security authentication scheme in machine-to-machine home network service

Author keywords

Authentication protocol; Home network; Machine to machine (M2M); Security; TD SCDMA network

Indexed keywords

AUTHENTICATION; CODE DIVISION MULTIPLE ACCESS; HOME NETWORKS; MACHINE-TO-MACHINE COMMUNICATION; PERSONAL COMMUNICATION SYSTEMS; RELIABILITY ANALYSIS;

EID: 84944111806     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.551     Document Type: Article
Times cited : (32)

References (13)
  • 1
    • 84944138953 scopus 로고    scopus 로고
    • TTU Internet Reports 2005: The Internet of Things
    • International Telecommunication Union UTT. TTU Internet Reports 2005: The Internet of Things, 2005.
    • (2005)
  • 2
    • 78149349578 scopus 로고    scopus 로고
    • A study of information security for M2M of IOT
    • The 3rd International Conference on Advanced Computer Theory and Engineering, Chengdu
    • Du J, Chao SW. A study of information security for M2M of IOT. The 3rd International Conference on Advanced Computer Theory and Engineering 2010, Chengdu; 576-579.
    • (2010) , pp. 576-579
    • Du, J.1    Chao, S.W.2
  • 4
    • 77958601933 scopus 로고    scopus 로고
    • The Sixth International Conference on Networked Computing and Advanced Information Management, Seoul;
    • Nguyen TD, Aymen AS, Huh EN. A dynamic ID-based authentication scheme. The Sixth International Conference on Networked Computing and Advanced Information Management 2010, Seoul; 248-253.
    • (2010) A dynamic ID-based authentication scheme , pp. 248-253
    • Nguyen, T.D.1    Aymen, A.S.2    Huh, E.N.3
  • 5
    • 38049042285 scopus 로고    scopus 로고
    • The efficient security architecture for authentication and authorization in the home network
    • The Third International Conference on Natural Computation, Haikou;
    • Lee HK, Lee JY, Han JW. The efficient security architecture for authentication and authorization in the home network. The Third International Conference on Natural Computation 2007, Haikou; 713-717.
    • (2007) , pp. 713-717
    • Lee, H.K.1    Lee, J.Y.2    Han, J.W.3
  • 6
    • 84944045366 scopus 로고    scopus 로고
    • Home network modelling and home network user authentication mechanism using biometric information
    • IEEE Tenth International Symposium on Consumer Electronics, St. Petersburg;
    • Lee YK, Ju H, Kim DW, et al. Home network modelling and home network user authentication mechanism using biometric information. IEEE Tenth International Symposium on Consumer Electronics 2006, St. Petersburg; 1-5.
    • (2006) , pp. 1-5
    • Lee, Y.K.1    Ju, H.2    Kim, D.W.3
  • 8
    • 51949106988 scopus 로고    scopus 로고
    • A simple and secure authentication and key establishment protocol
    • The First International Conference on Emerging Trends in Engineering and Technology, Maharashtra
    • Das ML, Narasimhan VL. A simple and secure authentication and key establishment protocol. The First International Conference on Emerging Trends in Engineering and Technology 2008, Maharashtra; 844-849.
    • (2008) , pp. 844-849
    • Das, M.L.1    Narasimhan, V.L.2
  • 9
    • 84876014299 scopus 로고    scopus 로고
    • A hash-based EAP authentication protocol (in Chinese)
    • Chen FQ, Yao GX. A hash-based EAP authentication protocol (in Chinese). Computer Systems and Applications 2010; 19(6): 74-77.
    • (2010) Computer Systems and Applications , vol.19 , Issue.6 , pp. 74-77
    • Chen, F.Q.1    Yao, G.X.2
  • 10
    • 84944047556 scopus 로고    scopus 로고
    • Research on fast AES algorithm based on small-scale FPGA (in Chinese)
    • Leng W, Cao JC, Wang AG. Research on fast AES algorithm based on small-scale FPGA (in Chinese). Computer Engineering 2010; 36(7): 159-161.
    • (2010) Computer Engineering , vol.36 , Issue.7 , pp. 159-161
    • Leng, W.1    Cao, J.C.2    Wang, A.G.3
  • 12
    • 79952065574 scopus 로고    scopus 로고
    • Industrial sensor network security architecture
    • The Fourth International Conference on Emerging Security Information, Systems and Technologies, Venice
    • Falk R, Hof HJ. Industrial sensor network security architecture. The Fourth International Conference on Emerging Security Information, Systems and Technologies 2010, Venice; 97-102.
    • (2010) , pp. 97-102
    • Falk, R.1    Hof, H.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.