A secure and lightweight authentication scheme for next generation IoT infrastructure.
Minahil RanaAkasha ShafiqIzwa AltafMamoun AlazabKhalid MahmoodShehzad Ashraf ChaudhryYousaf Bin ZikriaPublished in: Comput. Commun. (2021)
Keyphrases
- lightweight
- authentication scheme
- authentication protocol
- communication infrastructure
- user authentication
- key management
- smart card
- secret key
- rfid systems
- wireless sensor networks
- security analysis
- security flaws
- public key
- mutual authentication
- rfid tags
- key distribution
- cryptographic protocols
- security services
- key agreement
- cloud computing
- resource constrained
- elliptic curve
- security requirements
- end to end
- intrusion detection