An efficient lightweight authentication scheme for dew-assisted IoT networks.
Upendra VermaMayank SohaniPublished in: Secur. Priv. (2024)
Keyphrases
- lightweight
- authentication scheme
- authentication protocol
- user authentication
- smart card
- social networks
- key management
- secret key
- rfid tags
- security flaws
- public key
- cloud computing
- network structure
- security analysis
- digital images
- wireless sensor networks
- similarity measure
- development environments
- communication infrastructure
- real time