期刊文献+

基于eUICC的智能家居认证方案 被引量:1

Authentication scheme of smart home based on eUICC
下载PDF
导出
摘要 分析了当前智能家居的各种主要安全隐患。针对隐患原因,提出智能家居认证关键点及基于eUICC的认证方案,包括总体架构、主要模块交互及关键流程等,最后,对eUICC在智能家居领域的应用进行了前景展望。 The main existing security risks in smart home services was analyzed. For the reason of these risks, the key points of smart home security and also the authentication scheme based on eUICC were put forward, including the overall architecture, main module interactions, key processes, etc. Finally, the application of eUICC in the field of smart home was prospected.
作者 黎艳 卢燕青 张荣 郭茂文 LI Yan;LU Yanqing;ZHANG Rong;GUO Maowen(Guangzhou Research Institute of China Teleeom Co., Ltd., Guangzhou 510630, China)
出处 《电信科学》 2018年第4期129-135,共7页 Telecommunications Science
关键词 eUICC 智能家居 用户卡认证 设备安全 eUICC, smart home, user card authentication, device security
  • 相关文献

参考文献5

二级参考文献34

  • 1高小平.中国智能家居的现状及发展趋势[J].低压电器,2005(4):18-21. 被引量:133
  • 2魏振春,韩江洪,张建军,张利.智能家居远程控制系统的设计[J].合肥工业大学学报(自然科学版),2005,28(7):751-754. 被引量:22
  • 3孙梅梅.智能家电发展现状与未来[J].电子技术(上海),2006,33(9):10-12. 被引量:12
  • 4ALAM M, REAZ M, ALI M. A review of smart homes-past, pres- ent, and future[J]. IEEE Trans. Systems, Man, and Cybernetics, 2012,42(6) : 12-16. 被引量:1
  • 5东莞安本先天下智能科技有限公司.安本智慧社区[EB/OL].[2014-09-23].http ://www.atxai.com/solution/. 被引量:1
  • 6Vaidya B, Makrakis D, Mouftah H T. Improved two-factor user authentication in wireless sensor networks. Proceedings of IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications(WiMob), Shenzhen, China, 2010:600-606. 被引量:1
  • 7Mnif A, Cheikhrouhou O, Jemaa M B. An ID-based user authentication scheme for wireless sensor networks using ECC. Proceedings of 2011 International Conference on Microelectronics (ICM), Nanjing, China, 2011:1-9. 被引量:1
  • 8Huang X, Dharmendra S, Cui H Y. Fuzzy controlling window for elliptic curve cryptography in wireless sensor networks. Proceedings of the International Conference on Information Networking 2014 (ICOIN2014), Xiamen, China, 2014:312-317. 被引量:1
  • 9Faye Y, Guyennet H, Niang I, et ol. Fast scalar multiplication on elliptic curve cryptography in selected intervals suitable for wireless sensor networks. Lecture Notes in Computer Science, 2013(1):171-182. 被引量:1
  • 10Xue K, Ma C, Hong P, eta/. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network & Computer App|ications, 2013, 36(1):316-323. 被引量:1

共引文献141

同被引文献3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部