Authentication and Trustful Communication Protocol for IoT Devices

Seiya Kobayashi, T. Miyazaki
{"title":"Authentication and Trustful Communication Protocol for IoT Devices","authors":"Seiya Kobayashi, T. Miyazaki","doi":"10.1109/IMCOM51814.2021.9377369","DOIUrl":null,"url":null,"abstract":"This study proposes a network protocol that enables connecting Internet-of-Things (IoT) devices to IoT servers without modifying the original IoT service applications. Access proxies, introduced at the edge of an IoT network cloud, intercept packets flowing between the IoT devices and servers, and examine the credibility of each loT device in real time. After registering a new IoT device using an access proxy, the data produced by the IoT device or the server were significantly protected. Intended attacks and spoofing were also blocked at the access proxies. Therefore, IoT services are safe for use in the proposed network environment.","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMCOM51814.2021.9377369","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

This study proposes a network protocol that enables connecting Internet-of-Things (IoT) devices to IoT servers without modifying the original IoT service applications. Access proxies, introduced at the edge of an IoT network cloud, intercept packets flowing between the IoT devices and servers, and examine the credibility of each loT device in real time. After registering a new IoT device using an access proxy, the data produced by the IoT device or the server were significantly protected. Intended attacks and spoofing were also blocked at the access proxies. Therefore, IoT services are safe for use in the proposed network environment.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
物联网设备的认证和可信通信协议
本研究提出一种网络协议,可以在不修改原有物联网服务应用的情况下,将物联网(IoT)设备连接到物联网服务器。接入代理,在物联网网络云的边缘引入,拦截在物联网设备和服务器之间流动的数据包,并实时检查每个loT设备的可信度。在使用访问代理注册新的物联网设备后,物联网设备或服务器产生的数据得到了显著的保护。有意的攻击和欺骗也在访问代理上被阻止。因此,在建议的网络环境中使用物联网服务是安全的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
On a Partially Verifiable Multi-party Multi-argument Zero-knowledge Proof EnvBERT: Multi-Label Text Classification for Imbalanced, Noisy Environmental News Data Method for Changing Users' Attitudes Towards Fashion Styling by Showing Evaluations After Coordinate Selection The Analysis of Web Search Snippets Displaying User's Knowledge An Energy Management System with Edge Computing for Industrial Facility
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1