UM
Residential Collegefalse
Status已發表Published
Internet of things' authentication and access control
Liu J.1; Xiao Y.1; Chen C.L.P.2
2012-12-01
Source PublicationInternational Journal of Security and Networks
ISSN17478405 17478413
Volume7Issue:4Pages:228-241
Abstract

The Internet of Things (IoT) is regarded as the next generation worldwide network that connects every necessary object to facilitate our daily life. Although it is only an abstract concept to some extent, a number of relevant undergoing researches make this blueprint more possible in the near future. Those works involve wired and wireless sensor networks, mobile ad-hoc network, radio frequency identification, ubiquitous computing, etc. Due to the inherent vulnerabilities of the internet, security and privacy issues should be considered and addressed before the IoT is widely deployed. Authentication and access control are two key techniques to prevent a computer or network component from being compromised. This paper mainly analyses existing authentication and access control methods, and then, it designs a feasible one for the IoT. Potential future directions are discussed at the end of this paper. Copyright © 2012 Inderscience Enterprises Ltd.

KeywordAccess Control Authentication Iot Rfid Security
DOI10.1504/IJSN.2012.053461
URLView the original
Language英語English
Scopus ID2-s2.0-84876964561
Fulltext Access
Citation statistics
Document TypeJournal article
CollectionUniversity of Macau
Affiliation1.University of Alabama
2.Universidade de Macau
Recommended Citation
GB/T 7714
Liu J.,Xiao Y.,Chen C.L.P.. Internet of things' authentication and access control[J]. International Journal of Security and Networks, 2012, 7(4), 228-241.
APA Liu J.., Xiao Y.., & Chen C.L.P. (2012). Internet of things' authentication and access control. International Journal of Security and Networks, 7(4), 228-241.
MLA Liu J.,et al."Internet of things' authentication and access control".International Journal of Security and Networks 7.4(2012):228-241.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Liu J.]'s Articles
[Xiao Y.]'s Articles
[Chen C.L.P.]'s Articles
Baidu academic
Similar articles in Baidu academic
[Liu J.]'s Articles
[Xiao Y.]'s Articles
[Chen C.L.P.]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Liu J.]'s Articles
[Xiao Y.]'s Articles
[Chen C.L.P.]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.