A Scalable SDN Architecture for Underwater Networks Security Authentication.
Qiuli ChenMing HeXiang ZhengFei DaiYuntian FengPublished in: IEICE Trans. Inf. Syst. (2018)
Keyphrases
- security requirements
- security mechanisms
- data encryption
- identity authentication
- authentication mechanism
- fuzzy vault
- user authentication
- network access
- software architecture
- encryption decryption
- security analysis
- factor authentication
- security services
- authentication systems
- security issues
- elliptic curve cryptography
- information security
- authentication protocol
- access control
- authentication scheme
- biometric data
- distributed hash tables
- integrity verification
- virtual private network
- identity management
- sensor networks
- biometric authentication
- public key cryptography
- electronic payment
- private key
- social networks
- cloud computing
- key agreement
- intrusion detection
- network structure
- smart card
- public key
- digital rights management
- differentiated services
- communication protocols
- security policies
- security systems
- key agreement protocol
- lightweight
- security properties
- peer to peer