Mutual authentication scheme of IoT devices in fog computing environment.
Sunakshi SinghVijay Kumar ChaurasiyaPublished in: Clust. Comput. (2021)
Keyphrases
- lightweight
- computing environments
- authentication scheme
- authentication protocol
- mobile computing
- smart card
- user authentication
- secret key
- key management
- public key
- grid computing
- pervasive computing
- management system
- cloud computing
- security flaws
- mobile devices
- service discovery
- mobile agents
- security analysis
- pervasive computing environments
- context awareness
- wireless devices
- mobile applications
- low cost