Enhancing IoT security with PUF-based authentication scheme.
Seungyong YoonByoung-Koo KimKeonwoo KimYousung KangPublished in: ICTC (2022)
Keyphrases
- authentication scheme
- key management
- user authentication
- elliptic curve cryptography
- smart card
- security flaws
- authentication protocol
- image encryption
- secret key
- public key
- security analysis
- mutual authentication
- image authentication
- high security
- key agreement
- security problems
- security mechanisms
- security requirements
- information security
- resource constrained
- wireless sensor networks
- private key
- intrusion detection
- least significant bit
- access control