Research on PKI-like Protocol for the Internet of Things
Through analyzing the essence of the IoT and the hiberarchy architecture in it, some security risks, security request and security ways for the risks are discussed. The possible technique at each layer and its advantage or disadvantage is studied respectively. The extremely characteristics of the pe...
Saved in:
Published in | 2013 Fifth International Conference on Measuring Technology and Mechatronics Automation pp. 915 - 918 |
---|---|
Main Authors | , , , , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.01.2013
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Through analyzing the essence of the IoT and the hiberarchy architecture in it, some security risks, security request and security ways for the risks are discussed. The possible technique at each layer and its advantage or disadvantage is studied respectively. The extremely characteristics of the perception layer are summarized, based on it, a PKI-like security mechanism including PKI-like security foundation architecture and PKI-like protocol are presented in this paper, and the characteristics and its application domain are summarized to present. A couple of new research directions are proposed. After some further improvement research on it, which maybe a hot topic in the near future. |
---|---|
ISBN: | 9781467356527 1467356522 |
ISSN: | 2157-1473 |
DOI: | 10.1109/ICMTMA.2013.227 |