Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture.
Tsu-Yang WuFangfang KongQian MengSaru KumariChien-Ming ChenPublished in: EURASIP J. Wirel. Commun. Netw. (2023)
Keyphrases
- cloud computing
- authentication protocol
- cloud computing environment
- computing platform
- cloud infrastructure
- distributed computing
- lightweight
- rfid tags
- network access
- security issues
- smart card
- computing infrastructure
- security analysis
- security protocols
- computing resources
- cloud storage
- big data
- data center
- cloud platform
- data management
- public key
- rfid systems
- distributed systems
- loosely coupled
- cloud services
- real time
- service providers
- software architecture
- management system
- distributed environment
- embedded systems
- secret key
- hash functions
- network security
- computer networks
- access control
- mobile devices
- data analysis
- database systems
- database