A provably secure and practical end-to-end authentication scheme for tactile Industrial Internet of Things.
Yimin GuoYajun GuoPing XiongFan YangChengde ZhangPublished in: Pervasive Mob. Comput. (2024)
Keyphrases
- end to end
- authentication scheme
- provably secure
- public key
- key management
- ad hoc networks
- secret key
- security model
- security analysis
- smart card
- user authentication
- authentication protocol
- wireless ad hoc networks
- multipath
- resource constrained
- secure communication
- signature scheme
- blind signature scheme
- standard model
- digital signature
- routing algorithm
- diffie hellman
- blind signature
- private key
- cost effective
- encryption scheme