• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于IEEE 802.11的物联网接入网络中资源受限设备的认证与密钥管理机制

An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

作者信息

Kim Ki-Wook, Han Youn-Hee, Min Sung-Gi

机构信息

Department of Computer and Radio Communication Engineering, Korea University, Seoul 136-713, Korea.

School of Computer Science and Engineering, Korea University of Technology and Education, CheonAn 330-708, Korea.

出版信息

Sensors (Basel). 2017 Sep 21;17(10):2170. doi: 10.3390/s17102170.

DOI:10.3390/s17102170
PMID:28934152
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC5676616/
Abstract

Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

摘要

许多物联网(IoT)服务利用物联网接入网络将小型设备与远程服务器连接起来。它们可以与标准通信技术(如IEEE 802.11ah)共享接入网络。然而,尚未提出一种适用于使用IEEE 802.11ah的资源受限物联网设备的认证和密钥管理(AKM)机制。因此,我们提出了一种用于物联网接入网络的新型AKM机制,该机制基于具有IEEE 802.1X认证机制的IEEE 802.11密钥管理。所提出的AKM机制不需要在接入网络域和物联网服务域之间预先配置任何安全信息。它考虑了物联网设备的资源限制,允许物联网设备将AKM流程的负担委托给一个功能强大的代理。该代理有足够的能力支持针对接入点的各种认证方法,并为物联网设备执行加密功能。性能分析表明,与现有的具有IEEE 802.1X认证机制的IEEE 802.11密钥管理相比,所提出的机制大大降低了资源受限物联网设备的计算成本、网络成本和内存使用。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c893/5676616/c40b6c2eb3db/sensors-17-02170-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c893/5676616/b8132cb4e619/sensors-17-02170-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c893/5676616/d453bdb4f170/sensors-17-02170-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c893/5676616/d2fd96f5d31d/sensors-17-02170-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c893/5676616/c40b6c2eb3db/sensors-17-02170-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c893/5676616/b8132cb4e619/sensors-17-02170-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c893/5676616/d453bdb4f170/sensors-17-02170-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c893/5676616/d2fd96f5d31d/sensors-17-02170-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c893/5676616/c40b6c2eb3db/sensors-17-02170-g004.jpg

相似文献

1
An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.基于IEEE 802.11的物联网接入网络中资源受限设备的认证与密钥管理机制
Sensors (Basel). 2017 Sep 21;17(10):2170. doi: 10.3390/s17102170.
2
Resource Management for Massive Internet of Things in IEEE 802.11ah WLAN: Potentials, Current Solutions, and Open Challenges.大规模物联网在 IEEE 802.11ah WLAN 中的资源管理:潜力、现有解决方案和开放挑战。
Sensors (Basel). 2022 Dec 5;22(23):9509. doi: 10.3390/s22239509.
3
IEEE 802.11ah: A Technology to Face the IoT Challenge.IEEE 802.11ah:应对物联网挑战的一项技术。
Sensors (Basel). 2016 Nov 22;16(11):1960. doi: 10.3390/s16111960.
4
Physical Unclonable Function and Hashing Are All You Need to Mutually Authenticate IoT Devices.物理不可克隆函数和散列是相互认证物联网设备所需的全部。
Sensors (Basel). 2020 Aug 5;20(16):4361. doi: 10.3390/s20164361.
5
Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle.面向舒适生活方式的安全物联网技术中的相互认证方案。
Sensors (Basel). 2015 Dec 24;16(1):20. doi: 10.3390/s16010020.
6
A Lightweight Continuous Authentication Protocol for the Internet of Things.一种用于物联网的轻量级连续认证协议。
Sensors (Basel). 2018 Apr 5;18(4):1104. doi: 10.3390/s18041104.
7
Real-Time Station Grouping under Dynamic Traffic for IEEE 802.11ah.IEEE 802.11ah在动态流量下的实时站点分组
Sensors (Basel). 2017 Jul 4;17(7):1559. doi: 10.3390/s17071559.
8
Secure Authentication and Credential Establishment in Narrowband IoT and 5G.窄带物联网和5G中的安全认证与凭证建立
Sensors (Basel). 2020 Feb 7;20(3):882. doi: 10.3390/s20030882.
9
A Selective Group Authentication Scheme for IoT-Based Medical Information System.一种用于基于物联网的医疗信息系统的选择性群组认证方案。
J Med Syst. 2017 Apr;41(4):48. doi: 10.1007/s10916-017-0692-9. Epub 2017 Feb 15.
10
LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment.基于边缘的物联网部署的轻量级设备认证和密钥管理机制(LDAKM-EIoT)
Sensors (Basel). 2019 Dec 14;19(24):5539. doi: 10.3390/s19245539.

引用本文的文献

1
Next Generation Wireless Technologies for Internet of Things.面向物联网的下一代无线技术
Sensors (Basel). 2018 Jan 14;18(1):221. doi: 10.3390/s18010221.

本文引用的文献

1
IEEE 802.11ah: A Technology to Face the IoT Challenge.IEEE 802.11ah:应对物联网挑战的一项技术。
Sensors (Basel). 2016 Nov 22;16(11):1960. doi: 10.3390/s16111960.