SECURE IOT DEVICE AUTHENTICATION
Ключові слова:
АУТЕНТИФІКАЦІЯ, ІНТЕРНЕТ РЕЧЕЙ, AUTHENTICATION, INTERNET OF THINGSАнотація
БЕЗПЕЧНА АУТЕНТИФІКАЦІЯ ПРИСТРОЇВ ІНТЕРНЕТУ РЕЧЕЙ
У статті наводиться опис способу аутентифікації пристроїв інтернету речей та користувацьких пристроїв за допомогою хмарної технології з використанням цифрових сертифікатів. Наведено структуру мережі на основі інфраструктури відкритого ключа.
Посилання
Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025 // - Access mode: https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/
L. Atzori, A. Iera, and G. Morabito, The Internet of Things: A survey.: Computer Networks, 2010, vol. 54, no. 15, pp. 2787–2805.
A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash. Internet of Things: A survey on enabling technologies, protocols, and applications.: IEEE Commun. Surveys Tuts., Fourth Quarter 2015, vol. 17, no. 4, pp. 2347–2376.
S. Mumtaz, A. Bo, al-Dulaimi and K.Tsang. Guest Editorial 5G and Beyond Mobile Technologies and applications for Industrial IoT.: IEEE Transactions on Industrial Informatics, June 2108, vol 14, no. 6, pp. 2588-2591.
J. Zhang, Trung Q. Duong, R. Woods, A. Marshall. Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview: ResearchGate, 2017.
##submission.downloads##
Як цитувати
Номер
Розділ
Ліцензія
Авторське право (c) 2020 Ihor Sushyn, Dmytro Minochkin
Ця робота ліцензується відповідно до Creative Commons Attribution 4.0 International License.
Authors who submit to this conference agree to the following terms:a) Authors retain copyright over their work, while allowing the conference to place this unpublished work under a Creative Commons Attribution License, which allows others to freely access, use, and share the work, with an acknowledgement of the work's authorship and its initial presentation at this conference.
b) Authors are able to waive the terms of the CC license and enter into separate, additional contractual arrangements for the non-exclusive distribution and subsequent publication of this work (e.g., publish a revised version in a journal, post it to an institutional repository or publish it in a book), with an acknowledgement of its initial presentation at this conference.
c) In addition, authors are encouraged to post and share their work online (e.g., in institutional repositories or on their website) at any point before and after the conference.