Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks.
Iqra AsgharMuhammad Ayaz KhanTahir AhmadSubhan UllahKhwaja Mansoor ul HassanAttaullah BuriroPublished in: Sensors (2023)
Keyphrases
- authentication scheme
- user authentication
- security flaws
- smart home
- password guessing
- security analysis
- smart card
- intrusion detection and prevention
- authentication protocol
- image encryption
- secret key
- security mechanisms
- elliptic curve cryptography
- web services
- security protocols
- security requirements
- biometric systems
- user interface
- public key
- key management
- human activities
- context aware
- security issues
- network security
- cryptographic protocols
- activity recognition
- provably secure
- malicious nodes
- cost effective
- data mining techniques