{"title":"基于节能设备的物联网节点认证协议","authors":"Shih-Chang Lin, Chih-Yu Wen","doi":"10.1109/ICCE-TW.2016.7520962","DOIUrl":null,"url":null,"abstract":"Because of the constrained devices and critical security concerns of the internet of things (IoT) applications, feasible wireless sensor-based systems require more breakthroughs in terms of network architecture, system design, and data processing techniques. Therefore, in this work we utilize device information in order to provide lightweight node authentication and effectively resolve the security problem, considering a connected hierarchical IoT architecture. Accordingly, for providing trustable services, we explore the trade-off between energy consumption management and the successful detection rate of malicious nodes in a heterogeneous internet of things and aim to develop a device-based node identification scheme.","PeriodicalId":6620,"journal":{"name":"2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)","volume":"62 1","pages":"1-2"},"PeriodicalIF":0.0000,"publicationDate":"2016-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Energy-efficient device-based node authentication protocol for the Internet of Things\",\"authors\":\"Shih-Chang Lin, Chih-Yu Wen\",\"doi\":\"10.1109/ICCE-TW.2016.7520962\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Because of the constrained devices and critical security concerns of the internet of things (IoT) applications, feasible wireless sensor-based systems require more breakthroughs in terms of network architecture, system design, and data processing techniques. Therefore, in this work we utilize device information in order to provide lightweight node authentication and effectively resolve the security problem, considering a connected hierarchical IoT architecture. Accordingly, for providing trustable services, we explore the trade-off between energy consumption management and the successful detection rate of malicious nodes in a heterogeneous internet of things and aim to develop a device-based node identification scheme.\",\"PeriodicalId\":6620,\"journal\":{\"name\":\"2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)\",\"volume\":\"62 1\",\"pages\":\"1-2\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-05-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCE-TW.2016.7520962\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCE-TW.2016.7520962","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Energy-efficient device-based node authentication protocol for the Internet of Things
Because of the constrained devices and critical security concerns of the internet of things (IoT) applications, feasible wireless sensor-based systems require more breakthroughs in terms of network architecture, system design, and data processing techniques. Therefore, in this work we utilize device information in order to provide lightweight node authentication and effectively resolve the security problem, considering a connected hierarchical IoT architecture. Accordingly, for providing trustable services, we explore the trade-off between energy consumption management and the successful detection rate of malicious nodes in a heterogeneous internet of things and aim to develop a device-based node identification scheme.