版权说明 操作指南
首页 > 成果 > 详情

A puf-based three-party authentication key establishment scheme for fog-enabled smart home

认领
导出
Link by DOI
反馈
分享
QQ微信 微博
成果类型:
期刊论文
作者:
Yang, Huan;Guo, Yajun;Guo, Yimin
通讯作者:
Guo, YJ
作者机构:
[Guo, Yajun; Yang, Huan] Cent China Normal Univ, Sch Comp, Luoyu Rd 152, Wuhan 430079, Peoples R China.
[Guo, Yimin] Zhongnan Univ Econ & Law, Sch Informat & Safety Engn, South Lake Ave 182, Wuhan 430073, Peoples R China.
通讯机构:
[Guo, YJ ] C
Cent China Normal Univ, Sch Comp, Luoyu Rd 152, Wuhan 430079, Peoples R China.
语种:
英文
关键词:
Authentication;Automation;Cryptography;Fog;Hardware security;Internet of things;Security systems;Authentication scheme;Home devices;Key establishment schemes;Low latency;Real time interactions;Security;Security datum;Smart homes;Smart-home system;Three party authentication;Fog computing
期刊:
Pervasive and Mobile Computing
ISSN:
1574-1192
年:
2023
卷:
95
页码:
101843
基金类别:
The authors are grateful to the anonymous reviewers for their constructive comments. This work was supported by the National Natural Science Foundation of China (Grant No. 62102453 ) and the Fundamental Research Funds for the Central Universities, China (Excellent Graduate Education Innovation Funding Project) (Grant No. 2023CXZZ156 ).
机构署名:
本校为第一且通讯机构
院系归属:
计算机学院
摘要:
With the rise of Internet of Things (IoT), the smart home is another emerging concept and application of IoT, where security and private data of devices are important. In this paper, fog computing is applied to the smart home environment, where fog can provide many smart features and services to the smart home. Fog computing has many advantages, such as low latency and real-time interaction. However, when fog computing is combined with smart home, it also faces some security threats: first, some fog nodes and smart home devices are deployed in public places, vulnerable to damage or theft by at...

反馈

验证码:
看不清楚,换一个
确定
取消

成果认领

标题:
用户 作者 通讯作者
请选择
请选择
确定
取消

提示

该栏目需要登录且有访问权限才可以访问

如果您有访问权限,请直接 登录访问

如果您没有访问权限,请联系管理员申请开通

管理员联系邮箱:yun@hnwdkj.com