Authentication of IoT Device and IoT Server Using Secure Vaults.
Trusit ShahSubbarayan VenkatesanPublished in: TrustCom/BigDataSE (2018)
Keyphrases
- authentication mechanism
- authentication protocol
- key management
- management system
- cloud computing
- secure manner
- key distribution
- user authentication
- remote server
- rfid systems
- data encryption
- authentication scheme
- identity management
- security mechanisms
- big data
- password authentication
- security analysis
- smart card
- location information
- rfid tags
- integrity verification
- secret key
- wireless sensor networks
- virtual private network
- session key
- client server
- security issues
- security requirements
- key agreement protocol
- security services
- data management
- public key
- secure communication
- web server
- mobile devices