Proposing and verifying a security protocol for hash function-based IoT communication system.
Kun-Hee HanWoo-Sik BaePublished in: Clust. Comput. (2016)
Keyphrases
- hash functions
- security protocols
- key management
- authentication protocol
- secret key
- block cipher
- rfid systems
- similarity search
- provably secure
- security services
- artificial immune algorithm
- locality sensitive hashing
- management system
- hashing algorithm
- security mechanisms
- hash table
- ad hoc networks
- hash tables
- hamming distance
- nearest neighbor search
- data distribution
- data sets
- cloud computing
- wireless sensor networks
- encryption scheme
- hashing methods
- authentication scheme
- data management
- multi dimensional
- high dimensional
- data mining