Abstract
Wearable devices become the most personal devices nowadays. The smartphone may become a second screen Internet of Things (IoT) future shaped by wearable devices as wearable devices get smarter. Wearable devices can accelerate speed of leading users to IoT, and the entrance of IoT will be wearable devices. A setback in wearable devices adoption might delay the overall adoption of the IoT among users, such as security issues. Service providers may utilize identity authentication and secure communication protocols for ensuring legitimacy of users and information transferring security. In this paper, we presented an end-to-end authenticated key exchange agreement for wearable devices in IoT environments. The protocol can satisfy some properties of key exchange agreement and be used with wearable devices in IoT environments.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.