A secure authentication mechanism for resource constrained devices.
Bacem MbarekAref MeddebWafa Ben JaballahMohamed MosbahPublished in: AICCSA (2015)
Keyphrases
- resource constrained
- authentication mechanism
- security services
- security mechanisms
- key management
- rfid tags
- mutual authentication
- data encryption
- embedded systems
- resource constraints
- secret sharing scheme
- wireless sensor networks
- sensor networks
- authentication protocol
- mobile devices
- security protocols
- lightweight
- rfid systems
- sensor nodes
- low cost
- security analysis
- data sets
- multipath
- temporal constraints
- cost effective