A Secure and LoRaWAN Compatible User Authentication Protocol for Critical Applications in the IoT Environment.
Abdollah JabbariJamshid Bagherzadeh MohasefPublished in: IEEE Trans. Ind. Informatics (2022)
Keyphrases
- user authentication
- authentication protocol
- security analysis
- authentication scheme
- keystroke dynamics
- lightweight
- cryptographic protocols
- remote user authentication scheme
- smart card
- information security
- rfid systems
- security protocols
- password guessing
- biometric authentication
- covert channel
- authentication systems
- real time
- secret key
- public key
- biometric systems
- cloud computing
- feature extraction
- data mining