10,882 Hits in 4.4 sec

Intelligent Home Network Authentication: Home Device Authentication Using Device Certification [chapter]

Deok-Gyu Lee, Yun-kyung Lee, Jong-wook Han, Jong Hyuk Park, Im-Yeong Lee
On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS  
We propose home device authentication, registration of certificate of home device and issuing method of certificate of home device.  ...  The intelligent home network environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive.  ...  devices is used in the home network.  ... 
doi:10.1007/978-3-540-76843-2_40 dblp:conf/otm/LeeLHPL07 fatcat:3g27c77fpfdnjhf6pz3bbyucly

Authenticated Key Establishment Protocols for a Home Health Care System

Kalvinder Singh, Vallipuram Muthukkumarasamy
2007 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information  
Thus only a very few conventional protocols can readily be used in sensor networks.  ...  This paper also proposes a protocol where a hand held device, such as a PDA, can establish a key with the majority of sensors found in our home health care system.  ...  We propose a number of key establishment and authentication protocols that can be successfully used in a Wireless Sensor Network (WSN).  ... 
doi:10.1109/issnip.2007.4496869 fatcat:t7jiaojqbvflrmeps3m5va45re

Device Authentication In Wireless And Pervasive Environments

Georgios Kambourakis, Stefanos Gritzalis, Jong Hyuk Park
2010 Intelligent Automation and Soft Computing  
Inter-domain device authentication, where applicable, and users' privacy as a side-effect are investigated as well.  ...  Under this context, device authentication must be considered as a key security issue, complementary and of equal importance to user authentication, in today's wireless and forthcoming ubiquitous realms  ...  A really robust user/device authentication scheme for smart homes is proposed in [38] . The authors introduce a user-centric secure multimedia service system suitable for intelligent home.  ... 
doi:10.1080/10798587.2010.10643089 fatcat:3scffeggbbad3f2kqwn6z7qlti

Authentication for Pervasive Computing [chapter]

Sadie Creese, Michael Goldsmith, Bill Roscoe, Irfan Zakiuddin
2004 Lecture Notes in Computer Science  
However, sound key management itself depends critically on sound authentication.  ...  In this paper we review current notions of entity authentication and discuss why we believe these notions are unsuitable for the pervasive domain.  ...  What trust will certificates carry, when their timely revocation will be even more problematic? How will certificates be used? Will certificates have to be issued per device, for its lifetime?  ... 
doi:10.1007/978-3-540-39881-3_12 fatcat:hhculyaqvncidkrlq6pefl7xee

Authentication Techniques in the Internet of Things Environment: A Survey

Sunghyuck Hong
2019 International Journal of Network Security  
Unlike computes and mobile devices, the IoT technology uses micro devices, and therefore lightweight cryptographic techniques with limited storing space are needed.  ...  Through this, this research presents a reference guide that can be used by companies or security protocol developers.  ...  As for device authentication mode, ID/PW, certificate, and SIM are used.  ... 
dblp:journals/ijnsec/Hong19 fatcat:k3g5ze74cfb5nfz6adjvzjm7se

Internet of Things Security, Device Authentication and Access Control: A Review [article]

Inayat Ali, Sonia Sabir, Zahid Ullah
2022 arXiv   pre-print
Device authentication and access controls is an essential area of IoT security, which is not surveyed so far.  ...  We spent our efforts to bring the state of the art device authentication and access control techniques on a single paper.  ...  Kerberos authentication for smart home system using IoT.  ... 
arXiv:1901.07309v3 fatcat:asethhby5rbcbciorxoubdyg64

A Robust Vertical Handover Authentication for SDN based 5G HetNets.pdf [article]

Alican Ozhelvaci
2020 Figshare  
Therefore, in this paper, the focus is on secure and seamless handover mechanism to supply strong, quick and mutual authentication.  ...  There are different new technologies that are emerging to tackle requirements of the future wireless mobile network, such as Network Function Virtualization (NFV), Software Defined Networking (SDN) and  ...  Home and foreign networks public keys are shared between these two networks and have a certificate which is issued by the certification authority.  ... 
doi:10.6084/m9.figshare.12674582.v1 fatcat:vgeddig6mjachnr2tyu3n5es44

A Computationally Intelligent Hierarchical Authentication and Key Establishment Framework for Internet of Things [article]

Mohammad Sayad Haghighi, Orwa Nader, Alireza Jolfaei
2020 arXiv   pre-print
We propose a hierarchical security architecture for this problem and focus on computationally lightweight authentication protocols which can intelligently distribute the computational load across multiple  ...  This article discusses the authentication problem in IoT, which is fundamental to providing CIA.  ...  It can be the home router for instance that connects the home network to the Internet.  ... 
arXiv:2008.08672v1 fatcat:zn36eyofyzet7b3hzc2wfi2jji

Design of Lightweight Authentication Protocol for Fog enabled Internet of Things- A Centralized Authentication Framework

Upendra Verma, Diwakar Bhardwaj
2022 International Journal of Communication Networks and Information Security  
It is stated that the proposed authentication framework will be useful in many IoT applications such as healthcare system, transportation system, smart cities, home energy management etc.  ...  Internet is a large network of networks that spans the entire globe. Internet is playing indispensable role in our daily lives.  ...  Introduction IoT can be defined as a large network of networks connecting billions of devices to exchange real time information for providing intelligent services [1] .  ... 
doi:10.17762/ijcnis.v12i2.4464 fatcat:elh5z67zhbdvzjlx76niol7xmm

Authentication and Privacy Challenges for Internet of Things Smart Home Environment

Riaz Muhammad
This study is a very good approach to find the solution of secure authentication for IOT based smart home environment and its appliances.  ...  The study aims to compare the different authentication methods with respect to smart home environment and trying to identify its limitation.  ...  Specially the term "Smart" indicates application of various intelligent devices for enhancing the performance of home environment [III] .  ... 
doi:10.26782/jmcms.2019.02.00018 fatcat:tuee263pwzgedgr24dcrypfqce

Robust and Lightweight Mutual Authentication Scheme in Distributed Smart Environments

Gurjot Singh Gaba, Gulshan Kumar, Himanshu Monga, Tai-Hoon Kim, Pardeep Kumar
2020 IEEE Access  
The proposed scheme uses implicit certificates and enables mutual authentication and key agreement between the smart devices in a smart environment.  ...  Distributed smart environments: IoT home area network; IoT-airport; IoT wireless sensor networks.  ...  ., smart grid, intelligent transport network, industrial control system, medical IoT, and smart homes, etc. [9] .  ... 
doi:10.1109/access.2020.2986480 fatcat:ixjyem7y4jb25f75a2uqtvyq4y

Research on authentication encryption mechanism based on intelligent door lock vulnerability risk

Yili Lu, I. Barukčić
2021 MATEC Web of Conferences  
This paper presents a wireless sensor network authentication encryption method based on SM9 algorithm.  ...  By implementing and deploying sensor network authentication encryption in practical applications, it avoids the leakage of sensitive information from public data exposed on the Internet.  ...  Authentication encryption mechanism in intelligent door lock sensor network The authentication and encryption of intelligent door lock sensor network is based on IBC key infrastructure, which includes  ... 
doi:10.1051/matecconf/202133608009 fatcat:lwc5shbwhbbpvhk2czmbd32xme

IEEE 802.11 roaming and authentication in wireless LAN/cellular mobile networks

Minghui Shi, Xuemin Shen, J.W. Mark
2004 IEEE wireless communications  
The certificate of each mobile station is stored in its home network. Thus, each home network server can be considered a CA server of its mobile stations.  ...  In cases other than authentication between a mobile station and its home network, the home network performs the major authentication job and then passes the authentication result to the mobile station.  ... 
doi:10.1109/mwc.2004.1325893 fatcat:rzxnpqtcove4vjgsf3snkfww64

NIMSA: Non-Interactive Multihoming Security Authentication Scheme for vehicular communications in Mobile Heterogeneous Networks [article]

Zongzheng Wang, Ping Dong
2022 arXiv   pre-print
In vehicular communications, in-vehicle devices' mobile and multihoming characteristics bring new requirements for devicevsecurity authentication.  ...  We proposed a non-interactive multihoming security authentication (NIMSA) scheme, a stateless network layer security authentication scheme triggered by data forwarding.  ...  In this paper, the identity-based non-interactive key is used to realize the security authentication of multi-homing mobile devices. In this design, MR and HA together constitute a security domain.  ... 
arXiv:2202.03808v1 fatcat:pyepoehf5rcy3ooffmgk37j4zi

Semantically supported Authentication and Privacy in Social Networks

Josef Noll, Mohammad M.R. Chowdhury, Gyorgy Kalman, Juan Miguel Gomez
2007 The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)  
Focus is on the semantic description of user's role in social networks and on securing the access through appropriate authentication mechanisms.  ...  A prototype using semantically defined social relationships demonstrates the capabilities of the suggested approach.  ...  Representing the Identity The proposed integrated identity mechanism consists of certificates, keys and preferences stored in a personal device and in the network.  ... 
doi:10.1109/secureware.2007.4385315 dblp:conf/securware/NollCKG07 fatcat:ge5mzrbstrf4thsafyk64rbo3u
« Previous Showing results 1 — 15 out of 10,882 results