A novel terminal security access method based on edge computing for IoT

S Chen, Y Jiang, H Wen, W Liu, J Chen… - … on Networking and …, 2018 - ieeexplore.ieee.org
S Chen, Y Jiang, H Wen, W Liu, J Chen, W Lei, A Xu
2018 International Conference on Networking and Network …, 2018ieeexplore.ieee.org
Internet of Things (IoT) architecture combining mobile edge computing and remote cloud
computing is an innovative model at present. It effectively solves the problems of high-
latency and energy consumption, and reduced network transmission bandwidth of IoT
devices, becoming a new generation of IoT network architecture. This paper studies the
network access security problems of IoT wireless devices lacking abundant computing
resources existed in the architecture. On this basis, this paper proposes an innovative non …
Internet of Things (IoT) architecture combining mobile edge computing and remote cloud computing is an innovative model at present. It effectively solves the problems of high-latency and energy consumption, and reduced network transmission bandwidth of IoT devices, becoming a new generation of IoT network architecture. This paper studies the network access security problems of IoT wireless devices lacking abundant computing resources existed in the architecture. On this basis, this paper proposes an innovative non-cryptographic security access method, which is a mobile edge computing-based Internet of Things security access. The difference between this method and the traditional cryptographic algorithm-based security access lies in the fact that no password authentication is required. It utilizes the hardware difference of heterogeneous access wireless devices, thus signal fingerprint characteristics generated by terminal devices radio frequency radiation are accessed at the edge computing device end for identity authentication.
ieeexplore.ieee.org
Showing the best result for this search. See all results