An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure.
Akasha ShafiqMuhammad Faizan AyubKhalid MahmoodMazhar SadiqSaru KumariChien-Ming ChenPublished in: J. Sensors (2020)
Keyphrases
- key distribution
- key management
- key agreement protocol
- security services
- group communication
- ad hoc networks
- provably secure
- signature scheme
- key exchange protocol
- digital signature scheme
- wireless sensor networks
- key exchange
- secret key
- security protocols
- management system
- authentication protocol
- resource constrained
- secure communication
- fault tolerant
- session key
- peer to peer
- secret sharing scheme
- signcryption scheme
- elliptic curve
- public key
- private key
- authentication and key agreement
- network infrastructure
- digital signature
- data collection
- diffie hellman
- authentication scheme
- trusted third party
- bilinear pairings