Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A proposal of multi-factor authentication scheme for secure iot environment

Full metadata record
DC Field Value Language
dc.contributor.authorHong, Y.-
dc.contributor.authorKim, J.-
dc.contributor.authorKim, D.-
dc.date.available2018-05-09T08:30:37Z-
dc.date.created2018-04-17-
dc.date.issued2015-
dc.identifier.issn2185-2766-
dc.identifier.urihttp://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/9670-
dc.description.abstractThis paper proposes a new access control method that can be applied to various information systems in IoT (Internet of Things) environment. As a variety of things are connected to the Internet, a new paradigm for developing a proper access control method is urgently needed. Devices need to access the network in the IoT environment. These devices and controlled objects have to judge whether the subject is true or false on the base of information, such as IP address and device ID. In this paper, we propose that multi-factor authentication scheme should be applied in order to identify the subjects and authorize proper rights to them. The authentication data are composed of MAC address, ID, password of mobile devices and MAC address, IPv6 address of controlled objects. These multi-factors are finger-printed and changed into the unique value. This unique value can play an important role in identifying the subjects for the proper access control in IoT environment. © 2015, ICIC Express Letters Office. All rights reserved.-
dc.publisherICIC Express Letters Office-
dc.relation.isPartOfICIC Express Letters, Part B: Applications-
dc.subjectAccess control-
dc.subjectAuthentication-
dc.subjectInternet-
dc.subjectMobile devices-
dc.subjectAuthentication data-
dc.subjectControlled objects-
dc.subjectIP addresss-
dc.subjectIpv6 address-
dc.subjectMAC address-
dc.subjectMulti factors-
dc.subjectMulti-factor authentication-
dc.subjectSecurity-
dc.subjectInternet of things-
dc.titleA proposal of multi-factor authentication scheme for secure iot environment-
dc.typeArticle-
dc.type.rimsART-
dc.identifier.bibliographicCitationICIC Express Letters, Part B: Applications, v.6, no.12, pp.3231 - 3236-
dc.description.journalClass1-
dc.identifier.scopusid2-s2.0-84977485435-
dc.citation.endPage3236-
dc.citation.number12-
dc.citation.startPage3231-
dc.citation.titleICIC Express Letters, Part B: Applications-
dc.citation.volume6-
dc.contributor.affiliatedAuthorKim, D.-
dc.type.docTypeArticle-
dc.subject.keywordAuthorAccess control-
dc.subject.keywordAuthorAuthentication-
dc.subject.keywordAuthorIoT (Internet of Things)-
dc.subject.keywordAuthorSecurity-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Dongsoo photo

Kim, Dongsoo
College of Engineering (Department of Industrial & Information Systems Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE