Secure the internet of things with challenge response authentication in fog computing.
Salem AlharbiPeter RodriguezRajaputhri MaharajaPrashant IyerNivethitha SubaschandraboseZilong YePublished in: IPCCC (2017)
Keyphrases
- authentication scheme
- authentication protocol
- authentication mechanism
- user authentication
- security mechanisms
- identity management
- factor authentication
- secure manner
- data encryption
- security requirements
- security analysis
- security issues
- integrity verification
- password authentication
- key distribution
- secure communication
- ubiquitous computing
- single image
- biometric authentication
- public key cryptography
- key agreement protocol
- cryptographic protocols
- weather conditions
- key management