메뉴 건너뛰기




Volumn , Issue , 2015, Pages

Towards continuous authentication in internet of things based on secret sharing scheme

Author keywords

Continuous Authentication; Internet of Things Security; Timebound Authentication

Indexed keywords

AUTHENTICATION; EMBEDDED SYSTEMS; INTERNET; INTERNET OF THINGS; INTERNET PROTOCOLS;

EID: 84960925017     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2818362.2818363     Document Type: Conference Paper
Times cited : (50)

References (31)
  • 1
    • 84883421524 scopus 로고    scopus 로고
    • A lightweight multicast authentication mechanism for small scale IoT applications
    • Yao, X., Han, X., X., Du, X.. 2013. A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications. IEEE Sensors Journal, vol. 13, no. 10, 3693-3701.
    • (2013) IEEESensors Journal , vol.13 , Issue.10 , pp. 3693-3701
    • Yao, X.1    Han, X.X.2    Du, X.3
  • 4
    • 84906496993 scopus 로고    scopus 로고
    • Smart Home system design based on internet of things
    • Wang, Z. 2014. Smart Home System Design Based on Internet of Things.Applied Mechanics and Materials, vols. 602-605, 3808-3812.
    • (2014) Applied Mechanics and Materials , vol.602-605 , pp. 3808-3812
    • Wang, Z.1
  • 5
    • 84879225866 scopus 로고    scopus 로고
    • On the features and challenges of security and privacy in distributed internet of things
    • Roman, R., Zhou, J., Lopez, J. 2013. On the features and challenges of security and privacy in distributed internet of things, Computer Networks, vol. 57, 2266-2279.
    • (2013) Computer Networks , vol.57 , pp. 2266-2279
    • Roman, R.1    Zhou, J.2    Lopez, J.3
  • 6
    • 84919372488 scopus 로고    scopus 로고
    • Security, privacy and trust in internet of things: The road ahead
    • Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A. 2015. Security, Privacy and Trust in Internet of Things: The Road Ahead. Computer Networks, vol. 76, 146-164.
    • (2015) Computer Networks , vol.76 , pp. 146-164
    • Sicari, S.1    Rizzardi, A.2    Grieco, L.A.3    Coen-Porisini, A.4
  • 8
    • 64849115259 scopus 로고    scopus 로고
    • Identities in the future Internet of Things
    • Sarma, A. and Girao, J. 2009. Identities in the future Internet of Things.Wireless Personal Communications, vol. 49, no. 3, 353-363.
    • (2009) Wireless Personal Communications , vol.49 , Issue.3 , pp. 353-363
    • Sarma, A.1    Girao, J.2
  • 9
    • 84901188390 scopus 로고    scopus 로고
    • A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
    • Turkanovic, M., Brumen, B., Holbl, M. 2014. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Networks, vol. 20, 96-112.
    • (2014) Ad Hoc Networks , vol.20 , pp. 96-112
    • Turkanovic, M.1    Brumen, B.2    Holbl, M.3
  • 11
    • 84894059526 scopus 로고    scopus 로고
    • An efficient authentication and access control scheme for perception layer on internet of things
    • Ye, N., Zhu, Y., Wang, R., Malekian, R., Qiao-min, L. 2014. An Efficient Authentication and Access Control Scheme for Perception Layer on Internet of Things, Applied Mathematics & Information Sciences, vol. 8, no. 4, 1617-1624.
    • (2014) Applied Mathematics & Information Sciences , vol.8 , Issue.4 , pp. 1617-1624
    • Ye, N.1    Zhu, Y.2    Wang, R.3    Malekian, R.4    Qiao-Min, L.5
  • 15
    • 84928029868 scopus 로고    scopus 로고
    • Security analysis and improvements of authentication and access control in the internet of things
    • Ndibanje, B., Lee, H., Lee, S. 2014. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things. Sensors, vol. 14, 14786-14805.
    • (2014) Sensors , vol.14 , pp. 14786-14805
    • Ndibanje, B.1    Lee, H.2    Lee, S.3
  • 16
    • 84879225866 scopus 로고    scopus 로고
    • On the features and challenges of security and privacy in distributed internet of things
    • Roman, R. Zhou, J., Lopez, J. 2013. On the features and challenges of security and privacy in distributed internet of things, Computer Networks, vol. 57, 2266-2279.
    • (2013) Computer Networks , vol.57 , pp. 2266-2279
    • Roman, R.1    Zhou, J.2    Lopez, J.3
  • 17
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A. 1979. How to Share a Secret, Communications of the ACM, vol. 22, no. 11, .612-613.
    • (1979) , Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 18
    • 84960894336 scopus 로고    scopus 로고
    • NIST (FIPS 180-3) Secure Hash Standard (shs)
    • NIST, 2008. (FIPS 180-3) Secure Hash Standard (shs).
    • (2008)
  • 20
    • 84907450481 scopus 로고    scopus 로고
    • An efficient real-time broadcast authentication scheme for command and control messages'
    • Yavuz, A.A. 2014. An efficient real-time broadcast authentication scheme for command and control messages', IEEE Transactions on Information Forensic and Security, vol. 9, no. 10, 1733-1742.
    • (2014) IEEETransactions on Information Forensic and Security , vol.9 , Issue.10 , pp. 1733-1742
    • Yavuz, A.A.1
  • 22
    • 84887275465 scopus 로고    scopus 로고
    • A lightweight RFID authentication protocol based one elliptic curve cryptography
    • Liu, Y., Qin, X., Wang, C., Li, B. 2013.A lightweight RFID authentication protocol based one elliptic curve cryptography, Journal of Computers, vol. 8, no. 11, 2880-2887.
    • (2013) Journal of Computers , vol.8 , Issue.11 , pp. 2880-2887
    • Liu, Y.1    Qin, X.2    Wang, C.3    Li, B.4
  • 29
    • 84885304488 scopus 로고    scopus 로고
    • DTLS based security and two-way authentication for the internet of things
    • Kothmayr, T., Schmitt, C., Hu, W., Brunig, M., Carle, G. 2013. DTLS based Security and Two-Way Authentication for the Internet of Things, Ad Hoc Networks, vol. 11, no. 8, 2710-2723.
    • (2013) Ad Hoc Networks , vol.11 , Issue.8 , pp. 2710-2723
    • Kothmayr, T.1    Schmitt, C.2    Hu, W.3    Brunig, M.4    Carle, G.5
  • 30
    • 85027085848 scopus 로고    scopus 로고
    • Datagram Transport Layer Seurity (DTLS) 1.2 profile for Internet o Things
    • Datagram Transport Layer Seurity (DTLS) 1.2 profile for Internet o Things', available at https://tools.ietf.org/html/draft-ietf-dice-profile-06.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.