Please use this identifier to cite or link to this item: http://nopr.niscair.res.in/handle/123456789/51195
Full metadata record
DC FieldValueLanguage
dc.contributor.authorNazemi, N-
dc.contributor.authorManzuri, M T-
dc.date.accessioned2019-11-01T10:22:02Z-
dc.date.available2019-11-01T10:22:02Z-
dc.date.issued2019-11-
dc.identifier.issn0975-1084 (Online); 0022-4456 (Print)-
dc.identifier.urihttp://nopr.niscair.res.in/handle/123456789/51195-
dc.description751-754en_US
dc.description.abstractInternet of Things (IoT) represents enabling all things in such a smart way that those things be accessed any time and anywhere through the Internet. Presence of IoT as a novel way of networking, opens up new concernsaround the communication and network world. A secure establishing in such a diffused network is a great concerns of the researchers. Due to Smart things’ resource-constraints and power-limitation the former ways of securing networks cannot be applicable in IoT. Thus, security bootstrapping has introduced a solution for establishing security in the first instance of deploying the network. In this study, we have proposed a security bootstrapping solution which can be applied in IoT environment. This security bootstrapping focused on the authentication phase of security as a basis. Our solution is based on having a unique device identifier, which physical address was chosen. Devices can automatically introduce themselves to the router of IoT network by their unique identifier with the minimum of human intervention. Besides, we suggest that an IoT Center to be a trusted medium between the manufacturer of smart things and the buyers. Therefore, we make a connection between the router and the IoT Center.en_US
dc.language.isoen_USen_US
dc.publisherNISCAIR-CSIR, Indiaen_US
dc.rights CC Attribution-Noncommercial-No Derivative Works 2.5 Indiaen_US
dc.sourceJSIR Vol.78(11) [November 2019]en_US
dc.subjectInternet of Thingsen_US
dc.subjectSecurity Bootstrappingen_US
dc.subjectMedia Access Control (MAC) Addressen_US
dc.subjectAuthenticationen_US
dc.titleAuthentication Phase of Security Bootstrapping in the Internet of Things Networks Based on a Trusted Zoneen_US
dc.typeArticleen_US
Appears in Collections:JSIR Vol.78(11) [November 2019]

Files in This Item:
File Description SizeFormat 
JSIR 78(11) 751-754.pdf217.16 kBAdobe PDFView/Open


Items in NOPR are protected by copyright, with all rights reserved, unless otherwise indicated.