Back to Search
Start Over
Resource Authentication Management Model Based on CA and DHT in Internet of Things
- Source :
- Proceedings of The 7th International Conference on Computer Engineering and Networks — PoS(CENet2017).
- Publication Year :
- 2017
- Publisher :
- Sissa Medialab, 2017.
-
Abstract
- Research on the Internet of Things (IoT) has been a hot spot in recent years. Resource authentication and management in IoT is a most important and challenging problem and is far to be solved. In this paper, we propose an effective distributed hierarchical IoT resource authentication and management model based on the key technologies of distributed hash table, Chord Ring and public key infrastructure. By using the exceptional advantage of search and Research on the Internet of Things (IoT) has been a hot spot in recent years. Resource authentication and management in IoT is a most important and challenging problem and is far to be solved. In this paper, we propose an effective distributed hierarchical IoT resource authentication and management model based on the key technologies of distributed hash table, Chord Ring and public key infrastructure. By using the exceptional advantage of search and query ability of the above technologies, the proposed model owns enhanced security and improved efficiency. Simulation results show that the proposed model can mutually authenticate the IoT end entities each other in more short time compared to other existing approaches. query ability of the above technologies, the proposed model owns enhanced security and improved efficiency. Simulation results show that the proposed model can mutually authenticate the IoT end entities each other in more short time compared to other existing approaches.
Details
- Database :
- OpenAIRE
- Journal :
- Proceedings of The 7th International Conference on Computer Engineering and Networks — PoS(CENet2017)
- Accession number :
- edsair.doi...........92b0349dac5908efac9128c4ebb56b78