{"title":"User authentication and key agreement scheme for internet of thing - a study","authors":"M. Durairaj, K. Muthuramalingam","doi":"10.1504/IJCAET.2018.10009631","DOIUrl":null,"url":null,"abstract":"Internet of things entails different aspects of different computing devices which join together to customise a system for interdependent interactions. It determines reliability in security which appears as a challenging issue with their limited resource. To address the security issues in wireless environment those are widely used, due to the immense development of computer networks. The simplest and suitable mechanism is authentication based on password which is widely used to ensure the system resources that are not properly acknowledged. In this regard, security protocols which are capable of minimising the processing capability and saves energy which can reserve in the devices. Several studies address the security mechanisms, the main objective states analyzing security and acknowledge the characteristics for integration with minimum power. This paper presents a summary of brief reviews on some of the recent articles on addressing the security issues of IoT environments.","PeriodicalId":346646,"journal":{"name":"Int. J. Comput. Aided Eng. Technol.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Comput. Aided Eng. Technol.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJCAET.2018.10009631","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Internet of things entails different aspects of different computing devices which join together to customise a system for interdependent interactions. It determines reliability in security which appears as a challenging issue with their limited resource. To address the security issues in wireless environment those are widely used, due to the immense development of computer networks. The simplest and suitable mechanism is authentication based on password which is widely used to ensure the system resources that are not properly acknowledged. In this regard, security protocols which are capable of minimising the processing capability and saves energy which can reserve in the devices. Several studies address the security mechanisms, the main objective states analyzing security and acknowledge the characteristics for integration with minimum power. This paper presents a summary of brief reviews on some of the recent articles on addressing the security issues of IoT environments.