首页> 外文会议>International Conference on Electrical and Electronic Engineering >Security Implementations in IoT Using Digital Signature
【24h】

Security Implementations in IoT Using Digital Signature

机译:使用数字签名的物联网中的安全性实现

获取原文

摘要

In recent advancements, different types of embedded IoT devices are connected with the wired or wireless network and continuously access the internet for communication. Cybercriminals are finding vulnerabilities on IoT devices and compromise them to launch massive attacks (e.g. DDoS, Spamming, MITM, RFID Skimming) to destroy the network. IoT devices having default authentication credentials are an easy target. To avoid cybercriminals, we need a more sophisticated authentication mechanism embedded with existing security measures. Digital signature has become an integral part of IoT to restrict illegal users. The digital signature verification process is a time-consuming operation and not advisable in IoT however we can minimize the time of verification through some optimization schemes. This paper summarizes all the existing digital signature implementation aspects in IoT and states their technological properties as well as features and loopholes.
机译:在最近的进步中,不同类型的嵌入式IoT设备与有线或无线网络连接,并不断访问Internet进行通信。网络罪犯正在发现IoT设备上的漏洞,并使其遭受攻击以发起大规模攻击(例如DDoS,垃圾邮件,MITM,RFID窃听)以破坏网络。具有默认身份验证凭据的IoT设备是一个简单的目标。为了避免网络犯罪分子,我们需要嵌入现有安全措施的更复杂的身份验证机制。数字签名已成为限制非法用户的物联网不可或缺的一部分。数字签名验证过程是一项耗时的操作,在IoT中不建议使用,但是我们可以通过一些优化方案来缩短验证时间。本文总结了物联网中所有现有的数字签名实现方面,并阐述了它们的技术特性以及功能和漏洞。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号