An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks
Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained Io...
Main Authors: | Ki-Wook Kim, Youn-Hee Han, Sung-Gi Min |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2017-09-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/17/10/2170 |
Similar Items
-
IEEE 802.11ah: A Technology to Face the IoT Challenge
by: Victor Baños-Gonzalez, et al.
Published: (2016-11-01) -
A comparison of 802.11ah and 802.15.4 for IoT
by: N. Ahmed, et al.
Published: (2016-09-01) -
Performance Analysis on IEEE 802.11ah Standard with Enhanced Distributed Channel Access Mechanism
by: Ana Oktaviana, et al.
Published: (2018-05-01) -
A Comparative Study of IEEE 802.11bd and IEEE 802.11p on the Data Dissemination Properties in Dynamic Traffic Scenarios
by: Shanzheng Xue, et al.
Published: (2024-03-01) -
Two level aggregation scheme with optimization in subframes headers for IEEE 802.11n wireless networks
by: Noma, Adamu Muhammad
Published: (2014)