Secure Opportunistic Large Array for Internet of Things

被引:0
|
作者
Ansel, Paul, V [1 ]
Aboothahir, M. A. [2 ]
Smritilakshmi, A. S. [2 ]
Jose, Babita Roslind [2 ]
机构
[1] AISNI, Dept Elect, Kochi, Kerala, India
[2] CUSAT, SOE, Div Elect, Kochi, Kerala, India
关键词
Internet of Things (IOT); Opportunistic large array (OLA); De bruijn graph;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The need for secure network architecture for Internet of Things (IoT) is directly influencing the success of the emerging applications using IoT. This paper picks smart billing in shopping mall as a sample application to study the security constraints and propose a secure process using Opportunistic Large Array as the base architecture.
引用
收藏
页码:201 / 204
页数:4
相关论文
共 50 条
  • [31] Leveraging Secure Multiparty Computation in the Internet of Things
    von Maltitz, Marcel
    Carle, Georg
    MOBISYS'18: PROCEEDINGS OF THE 16TH ACM INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, 2018, : 508 - 510
  • [32] ESIoT: Enabling Secure Management of the Internet of Things
    Kim, Jun Young
    Hu, Wen
    Sarkar, Dilip
    Jha, Sanjay
    PROCEEDINGS OF THE 10TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC 2017), 2017, : 219 - 229
  • [33] Toward Secure and Efficient Communication for the Internet of Things
    Li, Xin
    Wang, Minmei
    Wang, Huazhe
    Yu, Ye
    Qian, Chen
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2019, 27 (02) : 621 - 634
  • [34] Survey on secure communication protocols for the Internet of Things
    Kim Thuat Nguyen
    Laurent, Maryline
    Oualha, Nouha
    AD HOC NETWORKS, 2015, 32 : 17 - 31
  • [35] Secure access technology for industrial internet of things
    Wang, Bingquan
    Peng, Jin
    Cui, Meili
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (25):
  • [36] Secure Internet of Things Architecture (SIoTA) on the battlefield
    Williams, Jon
    Hong, Hannah
    Crosby, Larry
    Potter, James
    Neyer, Jon
    Thompson, Isaac
    Branson, Rob
    DISRUPTIVE TECHNOLOGIES IN INFORMATION SCIENCES VI, 2022, 12117
  • [37] Cognitive Packet Networks for the Secure Internet of Things
    Nowak, Mateusz
    Nowak, Slawomir
    Domanska, Joanna
    Czachorski, Tadeusz
    2019 GLOBAL IOT SUMMIT (GIOTS), 2019,
  • [38] Secure and Efficient Management Architecture for the Internet of Things
    Kim, Jun Young
    SenSys'15: Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015, : 499 - 500
  • [39] EclipseloT: A secure and adaptive hub for the Internet of Things
    Anthi, Eirini
    Ahmad, Shazaib
    Rana, Omer
    Theodorakopoulos, George
    Burnap, Pete
    COMPUTERS & SECURITY, 2018, 78 : 477 - 490
  • [40] Lightweight and Secure Cryptographic Implementations for the Internet of Things
    Preneel, Bart
    INFORMATION SECURITY THEORY AND PRACTICE: SECURING THE INTERNET OF THINGS, 2014, 8501 : XIII - XIV