Physical unclonable function based authentication protocol for unit IoT and ubiquitous IoT

M Zhao, X Yao, H Liu, H Ning - … in the Internet of Things (IIKI), 2016 - ieeexplore.ieee.org
Unit and Ubiquitous IoT (U2IoT) is a typical IoT architecture for achieving comprehensive
interactions of ubiquitous things. In U2IoT, security becomes a challenging issue due to …

Mécanismes de sécurité pour l'intégration des RCSFs à l'IoT (Internet of Things)

S Sahraoui - 2016 - eprints.univ-batna2.dz
L'Internet des objets (IoT) est un paradigme prometteur qui étale la connexion Internet de
nos jours pour interconnecter différents types d'objets intelligents, autre que les ordinateurs …

[PDF][PDF] A note on design flaws in one aggregated-proof based hierarchical authentication scheme for the internet of things

L Liu, Z Cao, O Markowitch - International Journal of Electronics …, 2016 - ijeie.jalaxy.com.tw
Abstract Internet of Things (IoT) aims to integrate physical perceptions, cyber interactions,
and social correlations, with the embedded intelligence. Recently Ning et al. have proposed …

Protocoles de sécurité efficaces pour les réseaux de capteurs IP sans-fil et l'Internet des Objets

KT Nguyen - 2016 - theses.hal.science
The Internet of Things (IoT) enables billions of embedded computing devices to connect to
each other. The smart things cover our everyday friendly devices, such as, thermostats …

[PDF][PDF] Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things

N Suriya, R Monisha, K Prema, JN Ameen - scholar.archive.org
The Internet of Things (Io T) is becoming an attractive system paradigm to realize
interconnections through the physical, cyber, and social spaces. During the interactions …