Chaining the secret: Lightweight authentication for security in pervasive computing.
Jiyong HanPublished in: PerCom Workshops (2016)
Keyphrases
- lightweight
- pervasive computing
- authentication protocol
- security requirements
- security mechanisms
- rfid tags
- ambient intelligence
- service discovery
- context aware
- daily life
- mobile devices
- ubiquitous computing
- security analysis
- security issues
- context awareness
- computing environments
- dos attacks
- smart environments
- information security
- secret key
- mobile computing
- security protocols
- pervasive environments
- intrusion detection
- network security
- service oriented architecture
- smart card
- access control
- wireless sensor networks
- web services
- smart home
- mobile applications
- resource constrained
- context sensitive
- block cipher