Authentication scheme of smart home based on eUICC
The main existing security risks in smart home services was analyzed.For the reason of these risks,the key points of smart home security and also the authentication scheme based on eUICC were put forward,including the overall architecture,main module interactions,key processes,etc.Finally,the applic...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2018-04-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018040/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530362086293504 |
---|---|
author | Yan LI Yanqing LU Rong ZHANG Maowen GUO |
author_facet | Yan LI Yanqing LU Rong ZHANG Maowen GUO |
author_sort | Yan LI |
collection | DOAJ |
description | The main existing security risks in smart home services was analyzed.For the reason of these risks,the key points of smart home security and also the authentication scheme based on eUICC were put forward,including the overall architecture,main module interactions,key processes,etc.Finally,the application of eUICC in the field of smart home was prospected. |
format | Article |
id | doaj-art-3c04dc8f1949467f90ec07ddfaaf2483 |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2018-04-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-3c04dc8f1949467f90ec07ddfaaf24832025-01-15T03:04:52ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012018-04-013412913559596095Authentication scheme of smart home based on eUICCYan LIYanqing LURong ZHANGMaowen GUOThe main existing security risks in smart home services was analyzed.For the reason of these risks,the key points of smart home security and also the authentication scheme based on eUICC were put forward,including the overall architecture,main module interactions,key processes,etc.Finally,the application of eUICC in the field of smart home was prospected.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018040/eUICCsmart homeuser card authenticationdevice security |
spellingShingle | Yan LI Yanqing LU Rong ZHANG Maowen GUO Authentication scheme of smart home based on eUICC Dianxin kexue eUICC smart home user card authentication device security |
title | Authentication scheme of smart home based on eUICC |
title_full | Authentication scheme of smart home based on eUICC |
title_fullStr | Authentication scheme of smart home based on eUICC |
title_full_unstemmed | Authentication scheme of smart home based on eUICC |
title_short | Authentication scheme of smart home based on eUICC |
title_sort | authentication scheme of smart home based on euicc |
topic | eUICC smart home user card authentication device security |
url | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018040/ |
work_keys_str_mv | AT yanli authenticationschemeofsmarthomebasedoneuicc AT yanqinglu authenticationschemeofsmarthomebasedoneuicc AT rongzhang authenticationschemeofsmarthomebasedoneuicc AT maowenguo authenticationschemeofsmarthomebasedoneuicc |