Cloud-Based Remote RFID Authentication for Security of Smart Internet of Things Applications.
Mohammed Imtyaz AhmedG. KannanPublished in: J. Inf. Knowl. Manag. (2021)
Keyphrases
- rfid technology
- mutual authentication
- rfid tags
- radio frequency identification
- security analysis
- authentication protocol
- rfid systems
- security mechanisms
- network access
- cloud computing
- authentication mechanism
- security requirements
- identity authentication
- user authentication
- fuzzy vault
- ubiquitous computing
- radio frequency identification rfid
- supply chain
- data encryption
- smart grid
- integrity verification
- big data
- key technologies
- authentication scheme
- smart objects
- low cost
- biometric data
- encryption decryption
- security issues
- information security
- factor authentication
- smart card
- security properties
- virtual private network
- supply chain management
- security services
- privacy protection
- key agreement
- public key
- access control
- identity management
- elliptic curve cryptography
- authentication systems
- private key
- biometric template
- security problems
- data collection
- public key infrastructure
- encryption scheme
- security policies
- biometric authentication
- key distribution
- security systems
- key agreement protocol
- trust negotiation
- security level
- resource constrained
- intrusion detection
- physical world
- trusted third party
- lightweight
- ambient intelligence
- data security
- security protocols