Efficient Authentication for Tiered Internet of Things Networks

被引:0
|
作者
Chen, Chi-Yuan [1 ]
机构
[1] Natl Ilan Univ, Dept Comp Sci & Informat Engn, Yilan, Taiwan
关键词
Authentication; Internet of Things; Wireless Sensor Network;
D O I
10.1007/978-3-319-60717-7_46
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Tiered Internet of Things (IoT) and Wireless Sensor Networks (WSN) are popular for efficient resource management. In order to reduce the communication overhead for unnecessary sensed data and avoid obtaining a false result, we propose to use aggregate signature to deal with the authentication problem.
引用
收藏
页码:469 / 472
页数:4
相关论文
共 50 条
  • [41] Privacy, Discovery, and Authentication for the Internet of Things
    Wu, David J.
    Taly, Ankur
    Shankar, Asim
    Boneh, Dan
    COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 : 301 - 319
  • [42] Authentication Techniques for the Internet of Things: A Survey
    Saadeh, Maha
    Sleit, Azzam
    Qatawneh, Mohammed
    Almobaideen, Wesam
    2016 CYBERSECURITY AND CYBERFORENSICS CONFERENCE (CCC), 2016, : 28 - 34
  • [43] Research of authentication techniques for the Internet of things
    Yan H.
    Wang L.
    Tongxin Xuebao/Journal on Communications, 2020, 41 (07): : 213 - 222
  • [44] A Survey on Authentication Techniques for the Internet of Things
    Atwady, Yahya
    Hammoudeh, Mohammad
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS (ICFNDS '17), 2017,
  • [45] Continuous Authentication and Authorization for the Internet of Things
    Shahzad, Muhammad
    Singh, Munindar P.
    IEEE INTERNET COMPUTING, 2017, 21 (02) : 86 - 90
  • [46] A Survey on Authentication Techniques for the Internet of Things
    Albalawi, Afrah
    Almrshed, Amal
    Badhib, Arwa
    Alshehri, Suhair
    2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, : 271 - 275
  • [47] An Authentication Protocol for the Medical Internet of Things
    El-Meniawy, Nagwa
    Rizk, Mohamed R. M.
    Ahmed, Magdy A.
    Saleh, Mohamed
    SYMMETRY-BASEL, 2022, 14 (07):
  • [48] Authentication Protocol for Securing Internet of Things
    Maarof, Ahmed
    Senhadji, Mohamed
    Labbi, Zouheir
    Belkasmi, Mostafa
    ICEMIS'18: PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON ENGINEERING AND MIS, 2018,
  • [49] Lightweight Authentication Scheme for Internet of Things
    Haenel, Arie
    Haddad, Yoram
    Zhang, Zonghua
    2020 IEEE 17TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC 2020), 2020,
  • [50] Internet of things' authentication and access control
    Liu, Jing
    Xiao, Yang
    Chen, C.L. Philip
    International Journal of Security and Networks, 2012, 7 (04) : 228 - 241