Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Turkish Journal of Electrical Engineering and Computer Sciences

2017

Authentication

Articles 1 - 1 of 1

Full-Text Articles in Computer Engineering

Token-Based Authentication Method For M2m Platforms, Hüseyi̇n Polat, Saadi̇n Oyucu Jan 2017

Token-Based Authentication Method For M2m Platforms, Hüseyi̇n Polat, Saadi̇n Oyucu

Turkish Journal of Electrical Engineering and Computer Sciences

Nowadays the fields in which machine-to-machine (M2M) applications are used and the numbers of M2M devices and users are increasing gradually. In an M2M application, M2M platforms are used in order to follow and analyze the data presented by M2M devices. The communication of multiple users and devices via an M2M platform causes some problems in terms of security. In this study, an M2M platform has been developed by using RestFul web services and NoSQL database. On this platform a token-based authentication method was used for multiple users and devices. In this method, an authorized request approach was adopted for …