Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks
by
Han, Youn-Hee
, Kim, Ki-Wook
, Min, Sung-Gi
in
access network security
/ authentication and key management (AKM)
/ IEEE 802.11ah
/ Internet of Things
/ Internet of Things (IoT)
/ resource constrained device
2017
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks
by
Han, Youn-Hee
, Kim, Ki-Wook
, Min, Sung-Gi
in
access network security
/ authentication and key management (AKM)
/ IEEE 802.11ah
/ Internet of Things
/ Internet of Things (IoT)
/ resource constrained device
2017
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks
by
Han, Youn-Hee
, Kim, Ki-Wook
, Min, Sung-Gi
in
access network security
/ authentication and key management (AKM)
/ IEEE 802.11ah
/ Internet of Things
/ Internet of Things (IoT)
/ resource constrained device
2017
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks
Journal Article
An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks
2017
Request Book From Autostore
and Choose the Collection Method
Overview
Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.
Publisher
MDPI AG,MDPI
This website uses cookies to ensure you get the best experience on our website.