
تعداد نشریات | 21 |
تعداد شمارهها | 608 |
تعداد مقالات | 8,999 |
تعداد مشاهده مقاله | 67,030,013 |
تعداد دریافت فایل اصل مقاله | 7,617,599 |
Provide an algorithm for connecting bootstrap-based smart objects to the cloud, using asymmetric encryption | ||
International Journal of Nonlinear Analysis and Applications | ||
مقاله 165، دوره 14، شماره 1، فروردین 2023، صفحه 2101-2110 اصل مقاله (493.76 K) | ||
نوع مقاله: Research Paper | ||
شناسه دیجیتال (DOI): 10.22075/ijnaa.2022.27504.3628 | ||
نویسنده | ||
Alireza Zeynali* | ||
Department of Electrical and Computer Engineering, Isfahan University Of Technology, Isfahan, Iran | ||
تاریخ دریافت: 26 بهمن 1400، تاریخ بازنگری: 28 اسفند 1400، تاریخ پذیرش: 04 خرداد 1401 | ||
چکیده | ||
Cloud computing and the Internet of Things have both experienced rapid and independent evolution. These two technologies are very different from each other and most of their features complement each other. These properties, which complement other technologies, are the main reason why researchers propose to integrate these two technologies, which in certain cases can be of great benefit. Therefore, the present study aimed to provide an algorithm for the connection of smart objects based on bootstrapping with the cloud, using asymmetric cryptography. In terms of purpose, this research is in the category of applied research. All relevant documents from written sources, including books, articles published in reputable scientific-research journals, research reports on the subject and academic dissertations, and valid Internet resources, and Related to the subject are studied and used. Using the public key on a resource-limited smart device with CoAP, we learn how to obtain a 3GPP-based public bootstrap architecture to ensure authentication and connectivity across a variety of devices. Then, with the help of standard protocols, including RADIUS and EAP, without the need to install new software on the phone, it is possible to automatically set up a wireless network with content to communicate with the cloud. Improved protocols meet the requirements of key IoT security services such as privacy, publicity, and credibility, and can achieve better performance with lower communication costs. On the other hand, the goal of most methods is to increase the scalability and performance of the system and control access to prevent unauthorized access. | ||
کلیدواژهها | ||
smart objects؛ bootstraping؛ asymmetric encryption | ||
مراجع | ||
[1] M. Antikainen, M. Sethi, S. Matetic and T. Aura, Commitment-based device-pairing protocol with synchronized drawings and comparison metrics, Pervasive Mobile Comput. 16 (2015), 205–219. [17] H. Shuai and X. Jianchuan, Ensuring data storage security through a novel third party auditor scheme in cloudcomputing, IEEE Int. Conf. Cloud Comput. Intell. Syst. IEEE, 2011, pp. 264–268. | ||
آمار تعداد مشاهده مقاله: 17,352 تعداد دریافت فایل اصل مقاله: 248 |