Digital fingerprint extraction method of IOT devices based on Cryptography
Abstract
References
Recommendations
Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks
AbstractIn today's world, the Internet of Things (IoT) plays a major role to interconnect all the devices and improve the overall Quality of Life (QoL) for people. The main concern among IoT systems revolve around three pillars namely security, ...
Identity-Based Group Devices Authentication Scheme for Internet of Things
MOBIMEDIA'18: Proceedings of the 11th EAI International Conference on Mobile Multimedia CommunicationsInternet of things (IoT) is used to provide real-time data collection and analysis of the target area by the cooperation of low-cost devices. The authentication towards multiple devices has become the research hot-spot considering of the requirement in ...
A Comprehensive and Lightweight Security Architecture to Secure the IoT Throughout the Lifecycle of a Device Based on HIMMO
ALGOSENSORS 2015: Revised Selected Papers of the 11th International Symposium on Algorithms for Sensor Systems - Volume 9536Smart objects are devices with computational and communication capabilities connected to the Internet forming the so called Internet of Things IoT. The IoT enables many applications, for instance outdoor lighting control, smart energy and water ...
Comments
Information & Contributors
Information
Published In

Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 58Total Downloads
- Downloads (Last 12 months)15
- Downloads (Last 6 weeks)1
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format