Round-Efficient Security Authentication Protocol for 5G Network.
Guining GengJunfeng MiaoNan XiaoPublished in: ACNS Workshops (2023)
Keyphrases
- authentication protocol
- lightweight
- smart card
- security analysis
- rfid systems
- rfid tags
- security protocols
- public key
- cryptographic protocols
- user authentication
- ban logic
- cyber attacks
- authentication scheme
- low cost
- key management
- secret key
- computer networks
- peer to peer
- trusted third party
- session key
- wireless sensor networks