Robust Three-Factor Lightweight Authentication Based on Extended Chaotic Maps for Portable Resource-Constrained Devices.
Arijit KaratiYu-Sheng ChangTing-Yu ChenPublished in: SECRYPT (2023)
Keyphrases
- lightweight
- resource constrained
- rfid tags
- wireless sensor networks
- security mechanisms
- authentication protocol
- communication infrastructure
- resource constraints
- chaotic maps
- sensor networks
- embedded systems
- key management
- sensor nodes
- public key
- energy consumption
- computer networks
- image compression
- digital signature
- authentication scheme
- image encryption
- chaotic sequence
- image encryption algorithm
- real time