Correction to: A Delicate Authentication Mechanism for IoT Devices with Lower Overhead Issues

نویسندگان

چکیده

Correction to: Chapter “A Delicate Authentication Mechanism for IoT Devices with Lower Overhead Issues” in: S. Smys et al. (eds.), Computer Networks and Inventive Communication Technologies, Lecture Notes on Data Engineering Communications Technologies 141, https://doi.org/10.1007/978-981-19-3035-5_7

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Self-Provisioning Mechanism in OpenStack for IoT Devices

The aim of this paper is to introduce a plug-and-play mechanism for an Internet of Things (IoT) device to instantiate a Software as a Service (SaaS) application in a private cloud, built up with OpenStack. The SaaS application is the digital avatar of a physical object connected to Internet. As a proof of concept, a Vending Machine is retrofitted and connected to Internet with and Arduino Open ...

متن کامل

A Distributed Security Mechanism for Resource-Constrained IoT Devices

Internet of Things (IoT) devices have developed to comprise embedded systems and sensors with the ability to connect, collect, and transmit data over the Internet. Although solutions to secure IoT systems exist, Class-0 IoT devices with insufficient resources to support such solutions are considered a resourceconstrained in terms of secure communication. This paper provides a distributed securi...

متن کامل

A Failure Correction Technique for Parallel Storage Devices with Minimal Device Overhead

A common technique for providing reliability in parallel storage designs, network le systems, and diskless checkpointing systems is the N + 1-Parity approach. This approach is simple in coding, but requires an excess number of additional \checksum" storage devices to recover more than one arbitrary device failure. This paper presents a general method to recover from the failure of m arbitrary s...

متن کامل

The Delicate Issues of Addition with Respect to XOR Differences

In this paper we analyze the previous attacks on the block cipher SHACAL-1 and show that all the differential-based attacks fail due to mistreatment of XOR differences through addition. We show that the previously published differential and rectangle attacks on SHACAL-1 fail as some of the underlying differentials are impossible. The relatedkey rectangle attacks on the cipher generally fail, bu...

متن کامل

An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechan...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture notes on data engineering and communications technologies

سال: 2023

ISSN: ['2367-4520', '2367-4512']

DOI: https://doi.org/10.1007/978-981-19-3035-5_68