A Secure Mutual authentication approach to fog computing environment.
Rudri KalariaA. S. M. KayesWenny RahayuEric PardedePublished in: Comput. Secur. (2021)
Keyphrases
- computing environments
- mutual authentication
- security analysis
- privacy protection
- authentication protocol
- authentication mechanism
- authentication scheme
- rfid tags
- secret key
- security requirements
- public key
- trusted third party
- private key
- rfid systems
- smart card
- trusted computing
- mobile agents
- pervasive computing environments
- user authentication
- security mechanisms
- data encryption
- encryption scheme
- lightweight
- key distribution
- distributed systems
- private information
- fault tolerant
- privacy preserving