Secure Bootstrapping and Rebootstrapping for Resource-Constrained Thing in Internet of Things
In Internet of Things, secure key establishment and building trust relationship between the thing and the home gateway (or the controller) in home network or Body Area Network are extremely important. Without the guarantee of establishment of key and trust relationship, the traffic over the Internet...
Saved in:
Main Authors: | Seung Wook Jung, Souhwan Jung |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2015-08-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1155/2015/174383 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Personal OAuth authorization server and push OAuth for Internet of Things
by: Seung Wook Jung, et al.
Published: (2017-06-01) -
Fine-Grained Support of Security Services for Resource Constrained Internet of Things
by: Hyo Jin Ban, et al.
Published: (2016-05-01) -
Joint resource configuration method for secure fog computing Internet of things
by: Shibo ZHANG, et al.
Published: (2023-07-01) -
Survey of the Internet of things operating system security
by: Anni PENG, et al.
Published: (2018-03-01) -
Integration of Heterogeneous Devices and Communication Models via the Cloud in the Constrained Internet of Things
by: Floris Van den Abeele, et al.
Published: (2015-10-01)