Fast Authentication and Progressive Authorization in Large-Scale IoT: How to Leverage AI for Security Enhancement?
He FangAngie QiXianbin WangPublished in: CoRR (2019)
Keyphrases
- security requirements
- security problems
- access control
- security mechanisms
- trust negotiation
- security policies
- security analysis
- identity authentication
- information security
- smart card
- management system
- security properties
- security model
- artificial intelligence
- identity management
- trust management
- fuzzy vault
- expert systems
- authentication protocol
- integrity verification
- trust relationships
- authentication mechanism
- factor authentication
- data encryption
- key distribution
- security systems
- user authentication
- key management
- security issues
- public key infrastructure
- authentication scheme
- data security
- security protocols
- virtual private network
- mutual authentication
- network access
- security services
- encryption decryption
- role based access control
- usage control
- access control policies
- diffie hellman
- authentication systems
- biometric template
- role assignment
- rights management