A secure authentication scheme for IoT application in smart home.
Pankaj KumarLokesh ChouhanPublished in: Peer-to-Peer Netw. Appl. (2021)
Keyphrases
- authentication scheme
- smart home
- user authentication
- security flaws
- secret key
- smart card
- authentication protocol
- key management
- activity recognition
- ambient intelligence
- human activities
- artificial intelligence
- lightweight
- context aware
- cloud computing
- intelligent systems
- assisted living
- smart home environment
- peer to peer