Abstract:
Due to the inherent vulnerabilities of the Internet, security and privacy issues should be considered and addressed before the Internet of Things is widely deployed. This...Show MoreMetadata
Abstract:
Due to the inherent vulnerabilities of the Internet, security and privacy issues should be considered and addressed before the Internet of Things is widely deployed. This paper mainly analyzes existing authentication and access control methods, and then, it designs a feasible one for the Internet of Things.
Date of Conference: 18-21 June 2012
Date Added to IEEE Xplore: 06 August 2012
ISBN Information: