Artificial neural network and symmetric key cryptography based verification protocol for 5G enabled Internet of Things.
Vincent Omollo NyangaresiMusheer AhmadAhmed AlkhayyatWei FengPublished in: Expert Syst. J. Knowl. Eng. (2022)
Keyphrases
- symmetric key
- security analysis
- security protocols
- artificial neural networks
- cryptographic protocols
- security requirements
- key management
- diffie hellman
- encryption scheme
- encryption algorithm
- secure communication
- public key
- key establishment
- security mechanisms
- authentication protocol
- secret key
- data protection
- security properties
- smart card
- public key cryptography
- security model
- key distribution
- mobile devices
- provably secure
- security services
- key technologies
- rfid tags
- standard model
- model checking
- elliptic curve
- formal analysis
- access control
- ad hoc networks
- wireless sensor networks
- group communication
- lightweight
- ciphertext