首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5篇
  免费   0篇
无线电   3篇
自动化技术   2篇
  2021年   1篇
  2019年   1篇
  2018年   2篇
  2013年   1篇
排序方式: 共有5条查询结果,搜索用时 15 毫秒
1
1.
In a multi-server authentication environment, a user only needs to register once at a central registration place before accessing the different services on the different registered servers. Both, from a user point of view as for the management and maintenance of the infrastructure, these types of environments become more and more popular. Smartcard- or smartphone-based approaches lead to more secure systems because they offer two- or three-factor authentication, based on the strict combination of the user’s password, the user’s biometrics and the possession of the device. In this paper, we propose an efficient anonymous authentication protocol in multiple server communication networks, called the EAAM protocol, which is able to establish user anonymity, mutual authentication, and resistance against known security attacks. The novelty of the proposed scheme is that it does not require a secure channel during the registration between the user and the registration center and is resistant to a curious but honest registration system. These features are established in a highly efficient way with the minimum amount of communication flows between user and server during the establishment of the secret shared key and by using light-weight cryptographic techniques such as Chebyshev chaotic map techniques and symmetric key cryptography. The performance and security of the protocol are analyzed and compared with the latest new proposals in this field.  相似文献   
2.
Wireless Personal Communications - The Internet of Things (IoT) technologies interconnect a broad range of network devices, differing in terms of size, weight, functionality, and resource...  相似文献   
3.

Remote patient monitoring is one of the cornerstones to enable Ambient Assisted Living. Here, a set of devices provide their corresponding input, which should be carefully aggregated and analysed to derive health-related conclusions. In the new Fifth-Generation (5G) networks, Internet of Things (IoT) devices communicate directly to the mobile network without any need of proxy devices. Moreover, 5G networks consist of Multi-access Edge Computing (MEC) nodes, which are taking the role of a mini-cloud, able to provide sufficient computation and storage capacity at the edge of the network. MEC IoT integration in 5G offers a lot of benefits such as high availability, high scalability, low backhaul bandwidth costs, low latency, local awareness and additional security and privacy. In this paper, we first detail the procedure on how to establish such remote monitoring in 5G networks. Next, we focus on the key agreement between IoT, MEC and registration center in order to guarantee mutual authentication, anonymity, and unlinkability properties. Taking into account the high heterogeneity of IoT devices that can contribute to an accurate image of the health status of a patient, it is of utmost importance to design a very lightweight scheme that allows even the smallest devices to participate. The proposed protocol is symmetric key based and thus highly efficient. Moreover, it is shown that the required security features are established and protection against the most of the well-known attacks is guaranteed.

  相似文献   
4.
Femtocells are commissioned in wide range of commercial systems, such as CDMA, GSM, LTE, Wi-Fi, and WiMAX, and offer economically viable solutions to improve network scalability and indoor coverage. The ability to offer multitude of context-aware and value added services, and per-user customization have caught world-wide research interest on femtocells. In this article, we have investigated the feasibility to use femtocells as short-range mobile base stations, and discussed the demanding architectural requirements and challenges. The protocol stack on legacy femtocells must be modified to realize mobility. Mobility introduces new challenges in security and user privacy. Firstly, we analyze several candidate mobility protocols that are deployable on Mobile Femtocells (MFs). Among them, Host Identity Protocol (HIP) was chosen due to enhanced support in flexible mobility, security and end-user privacy. Secondly, we propose the indispensable modifications that enable device mobility, and the suitable transport architecture options based on direct IP links and relay chains. Finally, with the simulation results, the proposal is verified, and the architectural options are evaluated. That, in turn, proves the proposed mobility protocol has low latency in location locking with respect to another competing protocol and low resource utilization as it is depicted from mean round trip time.  相似文献   
5.
This paper presents a roadmap for the transition from current gadget-centric digital services towards a gadget-free services environment called the Naked world. The main idea of the Naked world is that all the services which are currently provided by gadgets will be provided by the infrastructure, thus no gadgets will be needed to use any kind of digital services. When a user in the Naked world intends to use a service, the infrastructure senses the user, the nearby intelligent surrounding launches an interactive user interface, performs identification through biometric identities, provides the service, and then closes the session when the user finishes the job. Therefore, the Naked world comprises highly intelligent and context-aware interactive environments. The vision of the Naked world is an evolution towards a user-friendly and ubiquitously available digital services, which is naturally bounded by the technological advancement. Henceforth, this paper presents the essential technologies and functional requirements along with the current and forthcoming novel technological concepts and challenges for the realization of the Naked world.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号