Lightweight privacy-aware secure authentication scheme for cyber-physical systems in the edge intelligence era.
Bakkiam David DeebakFadi Al-TurjmanPublished in: Concurr. Comput. Pract. Exp. (2023)
Keyphrases
- lightweight
- authentication scheme
- privacy aware
- authentication protocol
- cyber physical systems
- user authentication
- personal information
- smart card
- secret key
- cyber security
- public key
- rfid tags
- role based access control
- security analysis
- embedded systems
- location based services
- wireless sensor networks
- real time
- data access
- information security
- access control