CYPHONIC Adapter: Enabling Secure P2P Connectivity for Diverse IoT Devices.
Ren GotoKazushige MatamaRyouta AihataMichiyo SudaHidekazu SuzukiKatsuhiro NaitoPublished in: CCNC (2024)
Keyphrases
- peer to peer
- key management
- management system
- key establishment
- mobile devices
- peer to peer computing
- real world
- smart objects
- cloud computing
- overlay network
- mobile agent system
- rfid systems
- low latency
- resource discovery
- reduce network traffic
- rights management
- identity management
- security requirements
- security issues
- mobile applications
- big data
- connected components
- lightweight
- security mechanisms
- multi party
- smart phones
- data sharing
- scalable distributed
- ad hoc networks