User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using Chinese Remainder Theorem.
Anup Kumar MauryaV. N. SastryPublished in: SSCC (2017)
Keyphrases
- user authentication
- chinese remainder theorem
- scheme for wireless sensor networks
- data aggregation
- stream cipher
- wireless sensor networks
- security analysis
- key management
- secret image sharing
- authentication scheme
- authentication protocol
- information security
- secret key
- sensor networks
- biometric systems
- security requirements
- smart card
- high security
- sensor nodes
- data streams
- energy consumption
- resource constrained
- network security
- ad hoc networks