An Efficient User Authentication and Key Agreement Scheme Wireless Sensor Network and IOT Using Various Security Approaches.
Manish BhardwajUpma KumariSumit KumarSanju ChoudharyPublished in: SN Comput. Sci. (2023)
Keyphrases
- wireless sensor networks
- security problems
- authentication and key agreement
- public key cryptography
- key management
- key establishment
- information security
- security model
- end users
- public key
- data security
- resource constrained
- intrusion detection
- access control
- security mechanisms
- elliptic curve
- security requirements