Correction to: A Delicate Authentication Mechanism for IoT Devices with Lower Overhead Issues
نویسندگان
چکیده
Correction to: Chapter “A Delicate Authentication Mechanism for IoT Devices with Lower Overhead Issues” in: S. Smys et al. (eds.), Computer Networks and Inventive Communication Technologies, Lecture Notes on Data Engineering Communications Technologies 141, https://doi.org/10.1007/978-981-19-3035-5_7
منابع مشابه
A Self-Provisioning Mechanism in OpenStack for IoT Devices
The aim of this paper is to introduce a plug-and-play mechanism for an Internet of Things (IoT) device to instantiate a Software as a Service (SaaS) application in a private cloud, built up with OpenStack. The SaaS application is the digital avatar of a physical object connected to Internet. As a proof of concept, a Vending Machine is retrofitted and connected to Internet with and Arduino Open ...
متن کاملA Distributed Security Mechanism for Resource-Constrained IoT Devices
Internet of Things (IoT) devices have developed to comprise embedded systems and sensors with the ability to connect, collect, and transmit data over the Internet. Although solutions to secure IoT systems exist, Class-0 IoT devices with insufficient resources to support such solutions are considered a resourceconstrained in terms of secure communication. This paper provides a distributed securi...
متن کاملA Failure Correction Technique for Parallel Storage Devices with Minimal Device Overhead
A common technique for providing reliability in parallel storage designs, network le systems, and diskless checkpointing systems is the N + 1-Parity approach. This approach is simple in coding, but requires an excess number of additional \checksum" storage devices to recover more than one arbitrary device failure. This paper presents a general method to recover from the failure of m arbitrary s...
متن کاملThe Delicate Issues of Addition with Respect to XOR Differences
In this paper we analyze the previous attacks on the block cipher SHACAL-1 and show that all the differential-based attacks fail due to mistreatment of XOR differences through addition. We show that the previously published differential and rectangle attacks on SHACAL-1 fail as some of the underlying differentials are impossible. The relatedkey rectangle attacks on the cipher generally fail, bu...
متن کاملAn Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks
Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechan...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture notes on data engineering and communications technologies
سال: 2023
ISSN: ['2367-4520', '2367-4512']
DOI: https://doi.org/10.1007/978-981-19-3035-5_68