Full lifecycle security management scheme for terminal keys under power IoT
Aiming at the terminal access and terminal communication security problems under Power IoT, a full lifecycle security management scheme for terminal keys under Power IoT is proposed in this paper. Firstly, the two-stage key distribution architecture based on the state secret algorithm is adopted in...
Saved in:
| Main Authors: | Wang Hui, Yuan Jiahui, Shi Zhentong, Fang Mu |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
National Computer System Engineering Research Institute of China
2025-01-01
|
| Series: | Dianzi Jishu Yingyong |
| Subjects: | |
| Online Access: | http://www.chinaaet.com/article/3000169885 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Optimizing Group Multi-Factor Authentication for Secure and Efficient IoT Device Communications
by: Salem AlJanah, et al.
Published: (2025-05-01) -
A Zero-Trust Authentication Scheme With Access Control for 6G-Enabled IoT Environments
by: Seunghwan Son, et al.
Published: (2024-01-01) -
Deterministic Systems for Cryptographic Primitives Used in Security Models in Particular IoT Configurations
by: Dana Simian, et al.
Published: (2025-03-01) -
Secure session key pairing and a lightweight key authentication scheme for liable drone services
by: Rajkumar .S.C, et al.
Published: (2023-12-01) -
Lightweight and Efficient Authentication and Key Distribution Scheme for Cloud-Assisted IoT for Telemedicine
by: Hyang Jin Lee, et al.
Published: (2025-05-01)