Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Authentication of IoT Device and IoT Server Using Security Key

View through CrossRef
Abstract The Internet of Things (IoT) is an emerging topic in the field of information technology (IT) that has attracted the interest of researchers from different parts of the world. Authentication of IoT includes the establishment of a model for controlling access to IoT devices through the internet and other unsecured network platforms. Strong authentication of IoT is necessary for ensuring that machines and devices could be trusted when it comes to data sharing. The whole idea of authentication further prevents cybercriminals from using loopholes in IoT devices to access data that they are not allowed to access. Various authentication techniques could be used to secure IoT servers and devices. Establishing mutual authentication between IoT servers and IoT devices has attracted a lot of research interests because it helps enhance the effectiveness and overall security of data sharing. Therefore, this research provides the basis for analyzing the whole idea of using security keys to encrypt both IoT servers and IoT devices.
Springer Science and Business Media LLC
Title: Authentication of IoT Device and IoT Server Using Security Key
Description:
Abstract The Internet of Things (IoT) is an emerging topic in the field of information technology (IT) that has attracted the interest of researchers from different parts of the world.
Authentication of IoT includes the establishment of a model for controlling access to IoT devices through the internet and other unsecured network platforms.
Strong authentication of IoT is necessary for ensuring that machines and devices could be trusted when it comes to data sharing.
The whole idea of authentication further prevents cybercriminals from using loopholes in IoT devices to access data that they are not allowed to access.
Various authentication techniques could be used to secure IoT servers and devices.
Establishing mutual authentication between IoT servers and IoT devices has attracted a lot of research interests because it helps enhance the effectiveness and overall security of data sharing.
Therefore, this research provides the basis for analyzing the whole idea of using security keys to encrypt both IoT servers and IoT devices.

Related Results

An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
Attribute-based multiuser authentication scheme between IoT devices for 5G environment
Attribute-based multiuser authentication scheme between IoT devices for 5G environment
Background/Objectives: Due to the development of mobile communication technology, infrastructure construction from 4G to 5G service, which is currently being serviced, is actively ...
Authentication-Chains: Blockchain-Inspired Lightweight Authentication Protocol for IoT Networks
Authentication-Chains: Blockchain-Inspired Lightweight Authentication Protocol for IoT Networks
Internet of Things networks (IoT) are becoming very important in industrial, medical, and commercial applications. The security aspect of IoT networks is critical, especially the a...
How Third Party Observers Respond to Overheard Service Failures: Implications for Frontline Service Employees and the Firm
How Third Party Observers Respond to Overheard Service Failures: Implications for Frontline Service Employees and the Firm
Frontline service employees and unhappy customers have generally been the main focus of the service failures research. It is established that service failures are difficult to prev...
Evaluating knowledge-based security questions for fallback authentication
Evaluating knowledge-based security questions for fallback authentication
Failed user authentication is a common event. Forgotten passwords and fingerprint non-recognition are the most common causes. Therefore, there is a need for efficient backup authen...
Role of Authentication Factors in Fin-Tech Mobile Transaction Security
Role of Authentication Factors in Fin-Tech Mobile Transaction Security
Abstract Fin-Tech is the merging of finance and technology to be considered a key term for technology-based financial operations and money transactions as far as Fin-Tech i...
Authentication of IoT Device and IoT Server Using Security Key
Authentication of IoT Device and IoT Server Using Security Key
Abstract IoT is an emerging topic in the field of IT that has attracted the interest of researchers from different parts of the world. Authentication of IoT includes the es...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...

Back to Top