A secure authentication technique for connecting different IoT devices in the smart city infrastructure.
Rohit SharmaRajeev AryaPublished in: Clust. Comput. (2022)
Keyphrases
- smart city
- authentication mechanism
- identity management
- service integration
- authentication protocol
- user authentication
- authentication scheme
- security mechanisms
- data encryption
- smart cities
- secure manner
- factor authentication
- security requirements
- cloud computing
- password authentication
- key distribution
- security analysis
- security services
- key management
- integrity verification
- mobile devices
- public key infrastructure
- public key cryptography
- rights management
- rfid tags
- smart card
- resource constrained
- big data
- mobile terminals
- information sharing
- user centered
- secret key
- public key
- smart objects
- wireless sensor networks
- security protocols
- security issues
- access control
- data management