Detailed Information

Cited 4 time in webofscience Cited 3 time in scopus
Metadata Downloads

Authentications for Internet of Things Security: Threats, Challenges and Studies

Full metadata record
DC Field Value Language
dc.contributor.authorMoon, Seo Yeon-
dc.contributor.authorPark, Jin Ho-
dc.contributor.authorPark, Jong Hyuk-
dc.date.available2019-03-13T01:52:06Z-
dc.date.created2018-09-12-
dc.date.issued2018-03-
dc.identifier.issn1607-9264-
dc.identifier.urihttp://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/31908-
dc.description.abstractThe Internet of Things (IoT) is attracting attention as the core technology with the development of the wireless network and the universal use of portable terminals. IoT provides high quality service to the user through various technology convergences that are based on smart devices to high performance. However, due to the vulnerabilities connected with complex technologies and problems with implementation methods, there are various security threats. Therefore, to provide the best service, it is necessary to construct a secure environment for security threats in the IoT. It also must be protected and managed the device via authentication or secure policies. In this paper, we describe the security threats, issue and consideration in IoT, and we examine authentication structure, lightweight technology, and key management. We also propose an authentication service scenario based on existing authentication technology and research. Finally, we present the development and research direction of Internet security technology to provide secure service.-
dc.language영어-
dc.language.isoen-
dc.publisherLIBRARY & INFORMATION CENTER, NAT DONG HWA UNIV-
dc.relation.isPartOfJOURNAL OF INTERNET TECHNOLOGY-
dc.subjectWIRELESS SENSOR NETWORKS-
dc.subjectUSER AUTHENTICATION-
dc.subjectKEY AGREEMENT-
dc.subjectIOT PLATFORM-
dc.subjectSCHEME-
dc.titleAuthentications for Internet of Things Security: Threats, Challenges and Studies-
dc.typeArticle-
dc.identifier.doi10.3966/160792642018031902004-
dc.type.rimsART-
dc.identifier.bibliographicCitationJOURNAL OF INTERNET TECHNOLOGY, v.19, no.2, pp.349 - 358-
dc.description.journalClass1-
dc.identifier.wosid000430282100004-
dc.identifier.scopusid2-s2.0-85046746328-
dc.citation.endPage358-
dc.citation.number2-
dc.citation.startPage349-
dc.citation.titleJOURNAL OF INTERNET TECHNOLOGY-
dc.citation.volume19-
dc.contributor.affiliatedAuthorPark, Jin Ho-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.subject.keywordAuthorAuthentication-
dc.subject.keywordAuthorInternet of things-
dc.subject.keywordAuthorSecurity threat-
dc.subject.keywordAuthorComputer security-
dc.subject.keywordPlusWIRELESS SENSOR NETWORKS-
dc.subject.keywordPlusUSER AUTHENTICATION-
dc.subject.keywordPlusKEY AGREEMENT-
dc.subject.keywordPlusIOT PLATFORM-
dc.subject.keywordPlusSCHEME-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Information Technology > School of Software > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE