Secure Protocol for Resource-Constrained IoT Device Authentication.
Vincent Omollo NyangaresiAnthony Joachim RodriguesAhmad A. Al RababahPublished in: Int. J. Interdiscip. Telecommun. Netw. (2022)
Keyphrases
- resource constrained
- key management
- key distribution
- rfid tags
- authentication protocol
- security mechanisms
- mutual authentication
- rfid systems
- security protocols
- provably secure
- wireless sensor networks
- resource constraints
- security services
- session key
- authentication scheme
- diffie hellman
- secure communication
- sensor networks
- public key cryptography
- low cost
- lightweight
- elliptic curve
- password authentication
- cryptographic protocols
- authentication mechanism
- key agreement protocol
- multipath
- digital signature
- private key
- user authentication
- embedded systems
- virtual private network
- key agreement
- security analysis
- smart card
- public key
- source code
- data collection
- intrusion detection