RF-PUF: IoT Security Enhancement through Authentication of Wireless Nodes using In-situ Machine Learning.
Baibhab ChatterjeeDebayan DasShreyas SenPublished in: CoRR (2018)
Keyphrases
- machine learning
- wireless local area network
- security mechanisms
- security problems
- security requirements
- identity authentication
- network access
- wireless networks
- authentication protocol
- user authentication
- data encryption
- authentication mechanism
- key management
- access points
- security analysis
- security services
- cloud computing
- fuzzy vault
- integrity verification
- encryption decryption
- security issues
- access control
- received signal strength
- wireless mesh networks
- authentication systems
- factor authentication
- authentication scheme
- mobile nodes
- key distribution
- identity management
- management system
- wireless communication
- virtual private network
- physical layer
- information security
- electronic payment
- network security
- public key infrastructure
- trust negotiation
- signal strength
- key agreement protocol
- biometric data
- electronic devices
- network layer
- private key
- smart card
- mobile users
- biometric template
- radio frequency
- biometric authentication
- security systems
- rfid systems
- resource constrained
- mobile ad hoc networks
- public key cryptography
- secret key
- security protocols
- computer networks
- mobile terminals
- secure communication
- context aware
- intrusion detection
- key agreement
- data security
- big data
- encryption scheme
- security level
- graphical password
- security policies
- public key
- biometric systems