Light-Weight Secure IoT Key Generator and Management

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Applicable Light-weight Cryptography to Secure Medical Data in Iot Systems

Different applications require different level of security where the scarce of resource plays effective role. In order to protect the private medical data in the internet of things (IoT) field, the search for the optimal encryption algorithm is a must. Electronic sensors are used to collect medical data from the patient's body acquiring its transmission to the healthcare system securely. It is ...

متن کامل

Light-weight Key Management Scheme for Active RFID Applications

Due to low-cost and its practical solution, the integration of RFID tag to the sensor node called smart RFID has become prominent solution in various fields including industrial applications. Nevertheless, the constrained nature of smart RFID system introduces tremendous security and privacy problem. One of them is the problem in key management system. Indeed, it is not feasible to recall all R...

متن کامل

SDDR: Light-Weight, Secure Mobile Encounters

Emerging mobile social apps use short-range radios to discover nearby devices and users. The device discovery protocol used by these apps must be highly energy-efficient since it runs frequently in the background. Also, a good protocol must enable secure communication (both during and after a period of device co-location), preserve user privacy (users must not be tracked by unauthorized third p...

متن کامل

KISS: "Key It Simple and Secure" Corporate Key Management

Deploying a corporate key management system faces fundamental challenges, such as fine-grained key usage control and secure system administration. None of the current commercial systems (either based on software or hardware security modules) or research proposals adequately address both challenges with small and simple Trusted Computing Base (TCB). This paper presents a new key management archi...

متن کامل

Secure and efficient group key management with shared key derivation

In many network applications, including distant learning, audio webcasting, video streaming, and online gaming, often a source has to send data to many receivers. IP multicasts and application-layer multicasts provide efficient and scalable one-to-many or many-to-many communications. A common secret key, the group key, shared by multiple users can be used to secure the information transmitted i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Robotics & Automation Engineering Journal

سال: 2018

ISSN: 2577-2899

DOI: 10.19080/raej.2018.03.555625