Comments on "Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0".
Muhammad Arslan AkramKhalid MahmoodSaru KumariHu XiongPublished in: IEEE Internet Things J. (2020)
Keyphrases
- user authentication
- authentication scheme
- authentication mechanism
- authentication protocol
- security mechanisms
- password authentication
- data encryption
- security analysis
- factor authentication
- identity management
- integrity verification
- security requirements
- key distribution
- secure manner
- public key cryptography
- smart card
- secure communication
- rfid technology
- identity authentication
- encryption decryption
- key exchange protocol
- secret key
- physical world
- key agreement
- key technologies
- biometric authentication
- rights management
- elliptic curve cryptography
- mobile devices
- case study
- access control
- lightweight
- information sharing
- public key
- security services
- electronic payment
- ubiquitous computing
- security issues
- key management
- data security
- cryptographic protocols
- security protocols
- secret sharing scheme
- public key infrastructure
- mutual authentication
- trusted third party
- security properties
- private key