Authentication scheme of smart home based on eUICC

The main existing security risks in smart home services was analyzed.For the reason of these risks,the key points of smart home security and also the authentication scheme based on eUICC were put forward,including the overall architecture,main module interactions,key processes,etc.Finally,the applic...

Full description

Saved in:
Bibliographic Details
Main Authors: Yan LI, Yanqing LU, Rong ZHANG, Maowen GUO
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2018-04-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018040/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530362086293504
author Yan LI
Yanqing LU
Rong ZHANG
Maowen GUO
author_facet Yan LI
Yanqing LU
Rong ZHANG
Maowen GUO
author_sort Yan LI
collection DOAJ
description The main existing security risks in smart home services was analyzed.For the reason of these risks,the key points of smart home security and also the authentication scheme based on eUICC were put forward,including the overall architecture,main module interactions,key processes,etc.Finally,the application of eUICC in the field of smart home was prospected.
format Article
id doaj-art-3c04dc8f1949467f90ec07ddfaaf2483
institution Kabale University
issn 1000-0801
language zho
publishDate 2018-04-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-3c04dc8f1949467f90ec07ddfaaf24832025-01-15T03:04:52ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012018-04-013412913559596095Authentication scheme of smart home based on eUICCYan LIYanqing LURong ZHANGMaowen GUOThe main existing security risks in smart home services was analyzed.For the reason of these risks,the key points of smart home security and also the authentication scheme based on eUICC were put forward,including the overall architecture,main module interactions,key processes,etc.Finally,the application of eUICC in the field of smart home was prospected.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018040/eUICCsmart homeuser card authenticationdevice security
spellingShingle Yan LI
Yanqing LU
Rong ZHANG
Maowen GUO
Authentication scheme of smart home based on eUICC
Dianxin kexue
eUICC
smart home
user card authentication
device security
title Authentication scheme of smart home based on eUICC
title_full Authentication scheme of smart home based on eUICC
title_fullStr Authentication scheme of smart home based on eUICC
title_full_unstemmed Authentication scheme of smart home based on eUICC
title_short Authentication scheme of smart home based on eUICC
title_sort authentication scheme of smart home based on euicc
topic eUICC
smart home
user card authentication
device security
url http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018040/
work_keys_str_mv AT yanli authenticationschemeofsmarthomebasedoneuicc
AT yanqinglu authenticationschemeofsmarthomebasedoneuicc
AT rongzhang authenticationschemeofsmarthomebasedoneuicc
AT maowenguo authenticationschemeofsmarthomebasedoneuicc