{"title":"物联网多层次可信集群机制","authors":"Yaxin Zhao, Chunzi Chen","doi":"10.1109/ISCIT55906.2022.9931247","DOIUrl":null,"url":null,"abstract":"To solve the problem of data transmission security in the perception layer network, we propose a multi-level trusted clustering mechanism. This mechanism combines multi-level clustering, identity authentication and trusted computing, we also propose a two-way transmission authentication method based on symmetric cryptography. Finally, platform integrity is authenticated. The authentication scheme improves the security of intra-cluster communication and enables the network to form a secured and trusted cluster structure.","PeriodicalId":325919,"journal":{"name":"2022 21st International Symposium on Communications and Information Technologies (ISCIT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Multi-level Trusted Clustering Mechanism for IOT\",\"authors\":\"Yaxin Zhao, Chunzi Chen\",\"doi\":\"10.1109/ISCIT55906.2022.9931247\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To solve the problem of data transmission security in the perception layer network, we propose a multi-level trusted clustering mechanism. This mechanism combines multi-level clustering, identity authentication and trusted computing, we also propose a two-way transmission authentication method based on symmetric cryptography. Finally, platform integrity is authenticated. The authentication scheme improves the security of intra-cluster communication and enables the network to form a secured and trusted cluster structure.\",\"PeriodicalId\":325919,\"journal\":{\"name\":\"2022 21st International Symposium on Communications and Information Technologies (ISCIT)\",\"volume\":\"38 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 21st International Symposium on Communications and Information Technologies (ISCIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCIT55906.2022.9931247\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 21st International Symposium on Communications and Information Technologies (ISCIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCIT55906.2022.9931247","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Multi-level Trusted Clustering Mechanism for IOT
To solve the problem of data transmission security in the perception layer network, we propose a multi-level trusted clustering mechanism. This mechanism combines multi-level clustering, identity authentication and trusted computing, we also propose a two-way transmission authentication method based on symmetric cryptography. Finally, platform integrity is authenticated. The authentication scheme improves the security of intra-cluster communication and enables the network to form a secured and trusted cluster structure.