Secure Bootstrapping and Rebootstrapping for Resource-Constrained Thing in Internet of Things
In Internet of Things, secure key establishment and building trust relationship between the thing and the home gateway (or the controller) in home network or Body Area Network are extremely important. Without the guarantee of establishment of key and trust relationship, the traffic over the Internet...
Saved in:
Main Authors: | Seung Wook Jung, Souhwan Jung |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2015-08-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1155/2015/174383 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Personal OAuth authorization server and push OAuth for Internet of Things
by: Seung Wook Jung, et al.
Published: (2017-06-01) -
Fine-Grained Support of Security Services for Resource Constrained Internet of Things
by: Hyo Jin Ban, et al.
Published: (2016-05-01) -
Legal aspects of functional security standardisation of the Internet of Things
by: P. S. Klimushyn, et al.
Published: (2023-09-01) -
Defense and Security Mechanisms in the Internet of Things: A Review
by: Sabina Szymoniak, et al.
Published: (2025-01-01) -
Enhanced group communication in constrained application protocol–based Internet-of-things networks
by: Hyung-Woo Kang, et al.
Published: (2018-04-01)