Research on PKI-like Protocol for the Internet of Things

Through analyzing the essence of the IoT and the hiberarchy architecture in it, some security risks, security request and security ways for the risks are discussed. The possible technique at each layer and its advantage or disadvantage is studied respectively. The extremely characteristics of the pe...

Full description

Saved in:
Bibliographic Details
Published in2013 Fifth International Conference on Measuring Technology and Mechatronics Automation pp. 915 - 918
Main Authors Zhihua Li, Xi Yin, Zhenmin Geng, Haitao Zhang, Pengfei Li, Ya Sun, Huawei Zhang, Lin Li
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.01.2013
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Through analyzing the essence of the IoT and the hiberarchy architecture in it, some security risks, security request and security ways for the risks are discussed. The possible technique at each layer and its advantage or disadvantage is studied respectively. The extremely characteristics of the perception layer are summarized, based on it, a PKI-like security mechanism including PKI-like security foundation architecture and PKI-like protocol are presented in this paper, and the characteristics and its application domain are summarized to present. A couple of new research directions are proposed. After some further improvement research on it, which maybe a hot topic in the near future.
ISBN:9781467356527
1467356522
ISSN:2157-1473
DOI:10.1109/ICMTMA.2013.227