User authentication and key agreement scheme for internet of thing - a study Online publication date: Thu, 30-Aug-2018
by M. Durairaj; K. Muthuramalingam
International Journal of Computer Aided Engineering and Technology (IJCAET), Vol. 10, No. 5, 2018
Abstract: Internet of things entails different aspects of different computing devices which join together to customise a system for interdependent interactions. It determines reliability in security which appears as a challenging issue with their limited resource. To address the security issues in wireless environment those are widely used, due to the immense development of computer networks. The simplest and suitable mechanism is authentication based on password which is widely used to ensure the system resources that are not properly acknowledged. In this regard, security protocols which are capable of minimising the processing capability and saves energy which can reserve in the devices. Several studies address the security mechanisms, the main objective states analyzing security and acknowledge the characteristics for integration with minimum power. This paper presents a summary of brief reviews on some of the recent articles on addressing the security issues of IoT environments.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Computer Aided Engineering and Technology (IJCAET):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com