[PDF][PDF] HIP-protokollan käyttömahdollisuudet esineiden internetissä

EV Piki - 2018 - trepo.tuni.fi
Host Identity Protocol (HIP) on verkottamisarkkitehtuuri, jolla voidaan totetuttaa esineiden
internetille hyödyllisiä toiminnallisia ja tietoturvaa parantavia ominaisuuksia. HIP-protokollan …

A Contributory study on access control and authentication mechanisms for internet of things

M Atalay - 2019 - acikerisim.akdeniz.edu.tr
The focus of this work is authentication and access control mechanisms of the Internet of
Things frameworks. These mechanisms encompass different levels of privileges of access to …

Review on Routing Performance Matrices, Tools, Security Attacks and Defense Mechanisms in Context of Internet of Things

DB Gothawal, SV Nagaraj - 2018 Fourth International …, 2018 - ieeexplore.ieee.org
Recently, the evolving technologies in wireless communication demand the integration of
Wireless Sensor Network (WSN) with the Internet of Things (IoT). The IoT exploits the …

[HTML][HTML] Energy saving mechanisms in the security of the Internet of things

MZ Arrekhlou, A Sarvqad… - Revista …, 2018 - produccioncientifica.ucm.es
Energy consumption is one of the priorities of security on the Internet of Things. It is not easy
to find the best solutions that will reduce energy consumption, while ensuring that the …

An Adaptive Energy-Balanced Coordinated Node Scheduling Strategy for Low Energy Consumption and High Efficiency in Internet of Things

ZQ Liu, ZS Bai - 網際網路技術學刊, 2016 - airitilibrary.com
Perception layer is the interface between Internet of things (IoT) and the physical world, and
its own particularity fundamentally determines that its operation modes and control …

Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things

R Abdmeziem, D Tandjaoui, I Romdhani - 2016 - napier-repository.worktribe.com
Multimedia Internet KEYing protocol (MIKEY) aims at establishing secure credentials
between two communicating entities. However, existing MIKEY modes fail to meet the …

[引用][C] An authentication scheme for an IoT environment using advanced multiple encryption system

M Sundarrajan, AEA Narayanan - Int. J. Innov. Tech. Expl. Eng, 2019

[引用][C] Object persona: Should designers let go of the user?