作者: Singh Bijendra , Madhanagopal Praveen Kumar , Jones Christopher Warren , Dyson Richard
DOI:
关键词:
摘要: A network protocol is provided to identify and authenticate devices from different vendors that are deployed in a network. Each vendor key unique the by management server. server associated with provisions device first hash value generated using among other attributes. When network, queries device. The generates second sends it response computes local attributes received response. authenticates if matches value.