Login / Signup
Honey-list based authentication protocol for industrial IoT swarms.
Mohamed A. El-Zawawy
Pallavi Kaliyar
Mauro Conti
Sokratis K. Katsikas
Published in:
Comput. Commun. (2023)
Keyphrases
</>
authentication protocol
smart card
rfid systems
lightweight
security analysis
public key
rfid tags
particle swarm optimization
security protocols
secret key
real time
cloud computing
key management
hash functions
password authentication
security requirements
authentication mechanism
low cost
information systems