Boot-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of IoT Nodes.
Md. Mahmud HossainRagib HasanPublished in: ICIOT (2017)
Keyphrases
- authentication scheme
- privacy aware
- key management
- location information
- user authentication
- smart card
- personal information
- management system
- secret key
- cloud computing
- authentication protocol
- public key
- privacy preservation
- security analysis
- location based services
- ad hoc networks
- sensor nodes
- wireless sensor networks
- information security
- shortest path
- database systems