A Blockchain-Based Authentication and Security Mechanism for IoT.
Dongxing LiWei PengWenping DengFangyu GaiPublished in: ICCCN (2018)
Keyphrases
- security mechanisms
- security problems
- security issues
- resource constrained
- security requirements
- security systems
- access control
- smart card
- operating system
- cloud computing
- management system
- key management
- security services
- security protocols
- wireless sensor networks
- security analysis
- information security
- case study
- security measures
- resource constraints
- embedded systems
- shortest path
- rfid systems