ECC based inter-device authentication and authorization scheme using MQTT for IoT networks.
Ankur LohachabBidhan KarambirPublished in: J. Inf. Secur. Appl. (2019)
Keyphrases
- elliptic curve cryptography
- security analysis
- authentication scheme
- security requirements
- access control
- elliptic curve
- public key cryptography
- authentication protocol
- management system
- high security
- image authentication
- user authentication
- key distribution
- social networks
- public key
- smart card
- authentication mechanism
- error correction
- complex networks
- network structure
- big data
- private key
- secure communication
- cloud computing