Authentication technology in internet of things and privacy security issues in typical application scenarios
J Zhao, H Hu, F Huang, Y Guo, L Liao - Electronics, 2023 - mdpi.com
This paper mainly summarizes three aspects of information security: Internet of Things (IoT)
authentication technology, Internet of Vehicles (IoV) trust management, and IoV privacy …
authentication technology, Internet of Vehicles (IoV) trust management, and IoV privacy …
Blockchain-based decentralized authentication modeling scheme in edge and IoT environment
M Zhaofeng, M Jialin, W Jihui… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Authentication is the first entrance to kinds of information systems; however, traditional
centered single-side authentication is weak and fragile, which has security risk of single-side …
centered single-side authentication is weak and fragile, which has security risk of single-side …
Efficient and anonymous cross-domain authentication for IIoT based on blockchain
The rapid development of the Industrial Internet of Things (IIoT) has realized the intelligence
of industrial manufacturing and improved production efficiency. For improved collaboration …
of industrial manufacturing and improved production efficiency. For improved collaboration …
Trusted edge and cross-domain privacy enhancement model under multi-blockchain
H Minmin, Y Lingyun, P Xue, Z Chuan - Computer Networks, 2023 - Elsevier
With its promising security and distributed qualities, blockchain offers a significant
opportunity to break through the privacy protection issues in the edge computing paradigm …
opportunity to break through the privacy protection issues in the edge computing paradigm …
Blockchain meets edge computing: A distributed and trusted authentication system
As the great prevalence of various Internet of Things (IoT) terminals, how to solve the
problem of isolated information among different IoT platforms attracts attention from both …
problem of isolated information among different IoT platforms attracts attention from both …
A Review on Secure Authentication Protocols in IOV: Algorithms, Protocols, and Comparisons
A Aljumaili, H Trabelsi, W Jerbi - 2023 7th International …, 2023 - ieeexplore.ieee.org
The Internet of Vehicles (IoV) is an emerging technological advancement with the potential
to significantly transform the automotive industry and transportation networks. Its primary …
to significantly transform the automotive industry and transportation networks. Its primary …
VANETs and the use of IoT: Approaches, applications, and challenges
The vehicular ad-hoc network (VANET) has emerged as the most sought-after technology
due to its wide range of applications. In this modern era, people are looking for intelligent …
due to its wide range of applications. In this modern era, people are looking for intelligent …
Simple authentication method for vehicle monitoring IoT device with verifiable data integrity
This article proposes a new authentication method for vehicular monitoring Internet of
Things (IoT) systems. Based on parallel hash chains, the proposed method is suitable for …
Things (IoT) systems. Based on parallel hash chains, the proposed method is suitable for …
A security framework for IoT authentication and authorization based on blockchain technology
The decentralized and distributed nature of the Blockchain technology makes it a suitable
solution to improve the device-to-device communication security challenges. This work …
solution to improve the device-to-device communication security challenges. This work …
Blockchain-assisted secure intra/inter-domain authorization and authentication for Internet of Things
Multidomain Internet of Things (IoT) is faced with serious domain interoperability (DI) and
compatibility issues since different intradomain authorization and authentication (A&A) …
compatibility issues since different intradomain authorization and authentication (A&A) …
相关搜索
- privacy security issues authentication technology
- privacy security issues internet of things
- internet of things authentication technology
- privacy security issues application scenarios
- application scenarios authentication technology
- application scenarios internet of things
- iot authentication blockchain technology