Residential College | false |
Status | 已發表Published |
Internet of things' authentication and access control | |
Liu J.1; Xiao Y.1; Chen C.L.P.2 | |
2012-12-01 | |
Source Publication | International Journal of Security and Networks |
ISSN | 17478405 17478413 |
Volume | 7Issue:4Pages:228-241 |
Abstract | The Internet of Things (IoT) is regarded as the next generation worldwide network that connects every necessary object to facilitate our daily life. Although it is only an abstract concept to some extent, a number of relevant undergoing researches make this blueprint more possible in the near future. Those works involve wired and wireless sensor networks, mobile ad-hoc network, radio frequency identification, ubiquitous computing, etc. Due to the inherent vulnerabilities of the internet, security and privacy issues should be considered and addressed before the IoT is widely deployed. Authentication and access control are two key techniques to prevent a computer or network component from being compromised. This paper mainly analyses existing authentication and access control methods, and then, it designs a feasible one for the IoT. Potential future directions are discussed at the end of this paper. Copyright © 2012 Inderscience Enterprises Ltd. |
Keyword | Access Control Authentication Iot Rfid Security |
DOI | 10.1504/IJSN.2012.053461 |
URL | View the original |
Language | 英語English |
Scopus ID | 2-s2.0-84876964561 |
Fulltext Access | |
Citation statistics | |
Document Type | Journal article |
Collection | University of Macau |
Affiliation | 1.University of Alabama 2.Universidade de Macau |
Recommended Citation GB/T 7714 | Liu J.,Xiao Y.,Chen C.L.P.. Internet of things' authentication and access control[J]. International Journal of Security and Networks, 2012, 7(4), 228-241. |
APA | Liu J.., Xiao Y.., & Chen C.L.P. (2012). Internet of things' authentication and access control. International Journal of Security and Networks, 7(4), 228-241. |
MLA | Liu J.,et al."Internet of things' authentication and access control".International Journal of Security and Networks 7.4(2012):228-241. |
Files in This Item: | There are no files associated with this item. |
Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Edit Comment