GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Economics  (1)
Material
Publisher
Person/Organisation
Language
Years
Subjects(RVK)
  • Economics  (1)
RVK
  • 1
    Online Resource
    Online Resource
    Hindawi Limited ; 2021
    In:  Mobile Information Systems Vol. 2021 ( 2021-3-24), p. 1-9
    In: Mobile Information Systems, Hindawi Limited, Vol. 2021 ( 2021-3-24), p. 1-9
    Abstract: In the process of implementing the Internet of Things, the object itself has identity information and identification equipment and encounters difficulties in communication security during the process of entering the network communication. Just like the Internet and wireless sensor networks, there are security issues in information transmission. Therefore, it is of great significance to study the mobile Internet of Things network security technology depression to protect the communication information in the mobile Internet of Things. This paper mainly studies the network security technology of intelligent information terminal based on mobile Internet of Things. This article will analyze and compare the mainstream encryption algorithms of the current mobile Internet and choose a safer and more secure HASH algorithm. We study the flow of key management, key generation, key distribution, verification key distribution, key update, key storage, key backup, and key validity time setting for mobile Internet of Things, using an existing identity cryptosystem. Based on encryption, the design technology of key management and authentication in this paper is improved. Compared with other methods, the storage consumption of this method on GWN is relatively medium. In the initial stage, the storage is 32 bytes, then in registration stage 1, it reaches 84 bytes, in registration stage 2, it is 82 bytes, and then, in the login authentication phase, the number of bytes rose and reached 356 bytes in authentication phase 3. Experimental results show that this protocol has certain advantages in ensuring safety performance.
    Type of Medium: Online Resource
    ISSN: 1875-905X , 1574-017X
    RVK:
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2021
    detail.hit.zdb_id: 2187808-0
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...