Secure Authentication and Credential Establishment in Narrowband IoT and 5G.
Jesús Sánchez GómezDan García CarrilloRafael Marín-PérezAntonio F. SkarmetaPublished in: Sensors (2020)
Keyphrases
- symmetric key
- key management
- security analysis
- security requirements
- key distribution
- security mechanisms
- identity management
- security protocols
- access control
- authentication scheme
- wireless sensor networks
- password authentication
- ad hoc networks
- authentication mechanism
- resource constrained
- encryption scheme
- authentication protocol
- user authentication
- factor authentication
- secure communication
- data encryption
- public key
- public key cryptography
- user privacy
- cloud computing
- security services
- integrity verification
- smart card
- provably secure
- diffie hellman
- secure manner
- management system
- automated trust negotiation
- rights management
- digital signature
- private key
- key agreement protocol
- mutual authentication
- elliptic curve
- secret key
- secret sharing scheme
- security model
- public key encryption
- key exchange protocol
- image authentication
- security properties
- cryptographic protocols
- speech signal
- information sharing