An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Ki-Wook | - |
dc.contributor.author | Han, Youn-Hee | - |
dc.contributor.author | Min, Sung-Gi | - |
dc.date.accessioned | 2021-09-03T00:50:30Z | - |
dc.date.available | 2021-09-03T00:50:30Z | - |
dc.date.created | 2021-06-19 | - |
dc.date.issued | 2017-10 | - |
dc.identifier.issn | 1424-8220 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/82074 | - |
dc.description.abstract | Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | MDPI | - |
dc.title | An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Min, Sung-Gi | - |
dc.identifier.doi | 10.3390/s17102170 | - |
dc.identifier.scopusid | 2-s2.0-85030116354 | - |
dc.identifier.wosid | 000414931500012 | - |
dc.identifier.bibliographicCitation | SENSORS, v.17, no.10 | - |
dc.relation.isPartOf | SENSORS | - |
dc.citation.title | SENSORS | - |
dc.citation.volume | 17 | - |
dc.citation.number | 10 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Chemistry | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Instruments & Instrumentation | - |
dc.relation.journalWebOfScienceCategory | Chemistry, Analytical | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Instruments & Instrumentation | - |
dc.subject.keywordAuthor | Internet of Things (IoT) | - |
dc.subject.keywordAuthor | IEEE 802 | - |
dc.subject.keywordAuthor | 11ah | - |
dc.subject.keywordAuthor | resource constrained device | - |
dc.subject.keywordAuthor | access network security | - |
dc.subject.keywordAuthor | authentication and key management (AKM) | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.