Main Image

PoS(CENet2017)077

Resource Authentication Management Model Based on CA and DHT in Internet of Things

F. Li, L. Yuan, L. Peng, W. Cheng, Y. Feng

in The 7th International Conference on Computer Engineering and Networks

Contribution: pdf

Abstract

Research on the Internet of Things (IoT) has been a hot spot in recent years. Resource authentication and management in IoT is a most important and challenging problem and is far to be solved. In this paper, we propose an effective distributed hierarchical IoT resource authentication and management model based on the key technologies of distributed hash table, Chord Ring and public key infrastructure. By using the exceptional advantage of search and Research on the Internet of Things (IoT) has been a hot spot in recent years. Resource authentication and management in IoT is a most important and challenging problem and is far to be solved. In this paper, we propose an effective distributed hierarchical IoT resource authentication and management model based on the key technologies of distributed hash table, Chord Ring and public key infrastructure. By using the exceptional advantage of search and
query ability of the above technologies, the proposed model owns enhanced security and improved efficiency. Simulation results show that the proposed model can mutually authenticate the IoT end entities each other in more short time compared to other existing approaches. query ability of the above technologies, the proposed model owns enhanced security and improved efficiency. Simulation results show that the proposed model can mutually authenticate the IoT end entities each other in more short time compared to other existing approaches.