RF-PUF: Enhancing IoT Security through Authentication of Wireless Nodes using In-situ Machine Learning.
Baibhab ChatterjeeDebayan DasShovan MaityShreyas SenPublished in: CoRR (2018)
Keyphrases
- machine learning
- wireless local area network
- security mechanisms
- security problems
- security requirements
- identity authentication
- wireless networks
- user authentication
- received signal strength
- fuzzy vault
- authentication mechanism
- network access
- encryption decryption
- cloud computing
- integrity verification
- data encryption
- key management
- mobile nodes
- authentication protocol
- factor authentication
- security analysis
- authentication systems
- access points
- wireless communication
- information security
- biometric data
- security systems
- radio frequency
- authentication scheme
- mobile devices
- physical layer
- security services
- security issues
- security protocols
- identity management
- intrusion detection
- management system
- key distribution
- biometric authentication
- electronic devices
- wireless sensor networks
- wireless mesh networks
- malicious nodes
- virtual private network
- smart card
- key agreement
- resource constrained
- biometric template
- secret key
- access control
- ad hoc networks
- network security
- mobile networks
- key agreement protocol
- signal strength
- secure communication
- mobile terminals
- network layer
- base station
- public key cryptography
- private key
- rfid systems
- wifi
- big data
- encryption scheme