Supporting communications in the IoTs using the location/ID split protocol: A security analysis.
Ali Hussein RaheemAboubaker LasebaeMahdi AiashJonathan LooPublished in: FGCT (2013)
Keyphrases
- security analysis
- authentication protocol
- mutual authentication
- smart card
- security model
- public key
- security requirements
- security properties
- secure electronic
- high security
- key exchange
- user authentication
- encryption algorithm
- encryption scheme
- authentication scheme
- group communication
- private key
- communication networks
- lightweight