Group-based authentication schemes used for machine type communication devices in WSN: a review
M2M communication is the next vital part of IoT infrastructure. It is extremely important for IoT systems to prosper in machine-type communication (MTC) devices that have low computational power, limited energy and small amount of memory capabilities. Thousands of devices transmitting data while wor...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2020
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/89849/1/SUllah2020_Group-BasedAuthenticationSchemes.pdf http://eprints.utm.my/id/eprint/89849/ http://dx.doi.org/10.1088/1757-899X/884/1/012064 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.utm.89849 |
---|---|
record_format |
eprints |
spelling |
my.utm.898492021-03-04T02:47:24Z http://eprints.utm.my/id/eprint/89849/ Group-based authentication schemes used for machine type communication devices in WSN: a review Ullah, S. Raja Zahilah, Raja Zahilah Md. Arshad, Marina Abdullah, Abdul Hanan Kadir, Rashidah QA75 Electronic computers. Computer science M2M communication is the next vital part of IoT infrastructure. It is extremely important for IoT systems to prosper in machine-type communication (MTC) devices that have low computational power, limited energy and small amount of memory capabilities. Thousands of devices transmitting data while working remotely and independent of any external supervision, creates concern for the security of data and devices as the topology is totally different to that of personal computers. In relation to the security of the devices, authentication is the first important part that has to be addressed against all possible security threats in IoT communication. In this regard, we focus on different types of authentication techniques being carried out by the researchers in M2M communicating environment of several remotely operating devices and address their security threats. 2020-07-20 Conference or Workshop Item PeerReviewed application/pdf en http://eprints.utm.my/id/eprint/89849/1/SUllah2020_Group-BasedAuthenticationSchemes.pdf Ullah, S. and Raja Zahilah, Raja Zahilah and Md. Arshad, Marina and Abdullah, Abdul Hanan and Kadir, Rashidah (2020) Group-based authentication schemes used for machine type communication devices in WSN: a review. In: 2019 Sustainable and Integrated Engineering International Conference, SIE 2019, 8 December 2019 - 9 December 2019, The Everly Putrajaya, Putrajaya, Malaysia. http://dx.doi.org/10.1088/1757-899X/884/1/012064 |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Ullah, S. Raja Zahilah, Raja Zahilah Md. Arshad, Marina Abdullah, Abdul Hanan Kadir, Rashidah Group-based authentication schemes used for machine type communication devices in WSN: a review |
description |
M2M communication is the next vital part of IoT infrastructure. It is extremely important for IoT systems to prosper in machine-type communication (MTC) devices that have low computational power, limited energy and small amount of memory capabilities. Thousands of devices transmitting data while working remotely and independent of any external supervision, creates concern for the security of data and devices as the topology is totally different to that of personal computers. In relation to the security of the devices, authentication is the first important part that has to be addressed against all possible security threats in IoT communication. In this regard, we focus on different types of authentication techniques being carried out by the researchers in M2M communicating environment of several remotely operating devices and address their security threats. |
format |
Conference or Workshop Item |
author |
Ullah, S. Raja Zahilah, Raja Zahilah Md. Arshad, Marina Abdullah, Abdul Hanan Kadir, Rashidah |
author_facet |
Ullah, S. Raja Zahilah, Raja Zahilah Md. Arshad, Marina Abdullah, Abdul Hanan Kadir, Rashidah |
author_sort |
Ullah, S. |
title |
Group-based authentication schemes used for machine type communication devices in WSN: a review |
title_short |
Group-based authentication schemes used for machine type communication devices in WSN: a review |
title_full |
Group-based authentication schemes used for machine type communication devices in WSN: a review |
title_fullStr |
Group-based authentication schemes used for machine type communication devices in WSN: a review |
title_full_unstemmed |
Group-based authentication schemes used for machine type communication devices in WSN: a review |
title_sort |
group-based authentication schemes used for machine type communication devices in wsn: a review |
publishDate |
2020 |
url |
http://eprints.utm.my/id/eprint/89849/1/SUllah2020_Group-BasedAuthenticationSchemes.pdf http://eprints.utm.my/id/eprint/89849/ http://dx.doi.org/10.1088/1757-899X/884/1/012064 |
_version_ |
1693725954954756096 |
score |
13.187175 |