{"title":"物联网用户认证与密钥协议方案研究","authors":"M. Durairaj, K. Muthuramalingam","doi":"10.1504/IJCAET.2018.10009631","DOIUrl":null,"url":null,"abstract":"Internet of things entails different aspects of different computing devices which join together to customise a system for interdependent interactions. It determines reliability in security which appears as a challenging issue with their limited resource. To address the security issues in wireless environment those are widely used, due to the immense development of computer networks. The simplest and suitable mechanism is authentication based on password which is widely used to ensure the system resources that are not properly acknowledged. In this regard, security protocols which are capable of minimising the processing capability and saves energy which can reserve in the devices. Several studies address the security mechanisms, the main objective states analyzing security and acknowledge the characteristics for integration with minimum power. This paper presents a summary of brief reviews on some of the recent articles on addressing the security issues of IoT environments.","PeriodicalId":346646,"journal":{"name":"Int. J. Comput. Aided Eng. Technol.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"User authentication and key agreement scheme for internet of thing - a study\",\"authors\":\"M. Durairaj, K. Muthuramalingam\",\"doi\":\"10.1504/IJCAET.2018.10009631\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet of things entails different aspects of different computing devices which join together to customise a system for interdependent interactions. It determines reliability in security which appears as a challenging issue with their limited resource. To address the security issues in wireless environment those are widely used, due to the immense development of computer networks. The simplest and suitable mechanism is authentication based on password which is widely used to ensure the system resources that are not properly acknowledged. In this regard, security protocols which are capable of minimising the processing capability and saves energy which can reserve in the devices. Several studies address the security mechanisms, the main objective states analyzing security and acknowledge the characteristics for integration with minimum power. This paper presents a summary of brief reviews on some of the recent articles on addressing the security issues of IoT environments.\",\"PeriodicalId\":346646,\"journal\":{\"name\":\"Int. J. Comput. Aided Eng. Technol.\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-09-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Int. J. Comput. Aided Eng. Technol.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/IJCAET.2018.10009631\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Comput. Aided Eng. Technol.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJCAET.2018.10009631","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
User authentication and key agreement scheme for internet of thing - a study
Internet of things entails different aspects of different computing devices which join together to customise a system for interdependent interactions. It determines reliability in security which appears as a challenging issue with their limited resource. To address the security issues in wireless environment those are widely used, due to the immense development of computer networks. The simplest and suitable mechanism is authentication based on password which is widely used to ensure the system resources that are not properly acknowledged. In this regard, security protocols which are capable of minimising the processing capability and saves energy which can reserve in the devices. Several studies address the security mechanisms, the main objective states analyzing security and acknowledge the characteristics for integration with minimum power. This paper presents a summary of brief reviews on some of the recent articles on addressing the security issues of IoT environments.