Reputation-based partition scheme for IoT security.
Zhikui ChenMuhammad Zeeshan HaiderNaiwen LuoShuo YuXu YuanYaochen ZhangTayyaba NoreenPublished in: Secur. Priv. (2023)
Keyphrases
- security problems
- key management
- identity based cryptography
- information security
- protection scheme
- authentication scheme
- partitioning schemes
- management system
- security requirements
- high security
- digital signature scheme
- intrusion detection
- security issues
- diffie hellman
- key distribution
- security model
- data security
- security analysis
- network security
- elliptic curve cryptography
- authentication mechanism
- public key cryptosystem
- chosen plaintext
- secure communication
- partitioning algorithm
- trust management
- authentication protocol
- access control
- elliptic curve
- encryption scheme
- key agreement
- usage control
- statistical databases
- security policies
- big data
- cloud computing