Trusted Authentication Mechanism for Perceptual layer-oriented Network Routing
Abstract
References
Index Terms
- Trusted Authentication Mechanism for Perceptual layer-oriented Network Routing
Recommendations
Trusted authentication mechanism oriented to network computing offloading at the perception layer
ICCNS '22: Proceedings of the 2022 12th International Conference on Communication and Network SecurityThe current deep integration of the Internet of Things and edge computing has improved the computing capabilities of the perception layer of the Internet of Things. The existing edge computing offloading technology has the problems of lack of a security ...
Securing the perceptual layer of E-payment-based internet of things devices using elliptic curve cryptography over binary field
AbstractThe perceptual layer of the Internet of Things has some security threats, such as denial of service, botnet, and falsification attacks. The existing security schemes are the symmetric polynomial concept, privacy-preserving communication protocols ...
Security Data Fusion Method for IoT Perception Layer for New Electric Power Systems
BDMIP '23: Proceedings of the 2023 International Conference on Big Data Mining and Information ProcessingDue to the growth of Internet of Things (IOT) technology in recent years, IOT has effectively improved the efficiency of information transmission and production. To ensure the security and effectiveness of data fusion in the new electric power system (...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 15Total Downloads
- Downloads (Last 12 months)6
- Downloads (Last 6 weeks)1
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format