Cryptanalysis of a privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security.
Jongho MoonYoungsook LeeHyungkyu YangTaeui SongDongho WonPublished in: ICOIN (2018)
Keyphrases
- privacy preserving
- user authentication
- authentication scheme
- information security
- security analysis
- stream cipher
- privacy preserving data mining
- secure multiparty computation
- secret key
- authentication protocol
- sensitive data
- biometric systems
- data privacy
- data aggregation
- private information
- sensitive information
- privacy concerns
- privacy protection
- smart card
- low cost
- mobile devices
- wireless sensor networks
- scalar product
- security issues
- key management
- security requirements
- access control