Back to Search Start Over

Resource Authentication Management Model Based on CA and DHT in Internet of Things

Authors :
Wenbin Cheng
Lingxi Peng
Fufang Li
Yuanyong Feng
Lina Yuan
Source :
Proceedings of The 7th International Conference on Computer Engineering and Networks — PoS(CENet2017).
Publication Year :
2017
Publisher :
Sissa Medialab, 2017.

Abstract

Research on the Internet of Things (IoT) has been a hot spot in recent years. Resource authentication and management in IoT is a most important and challenging problem and is far to be solved. In this paper, we propose an effective distributed hierarchical IoT resource authentication and management model based on the key technologies of distributed hash table, Chord Ring and public key infrastructure. By using the exceptional advantage of search and Research on the Internet of Things (IoT) has been a hot spot in recent years. Resource authentication and management in IoT is a most important and challenging problem and is far to be solved. In this paper, we propose an effective distributed hierarchical IoT resource authentication and management model based on the key technologies of distributed hash table, Chord Ring and public key infrastructure. By using the exceptional advantage of search and query ability of the above technologies, the proposed model owns enhanced security and improved efficiency. Simulation results show that the proposed model can mutually authenticate the IoT end entities each other in more short time compared to other existing approaches. query ability of the above technologies, the proposed model owns enhanced security and improved efficiency. Simulation results show that the proposed model can mutually authenticate the IoT end entities each other in more short time compared to other existing approaches.

Details

Database :
OpenAIRE
Journal :
Proceedings of The 7th International Conference on Computer Engineering and Networks — PoS(CENet2017)
Accession number :
edsair.doi...........92b0349dac5908efac9128c4ebb56b78