Security Analysis on a Three-Factor Authentication Scheme of 5G Wireless Sensor Networks for IoT System.
Qingyun XieQi XiePublished in: IEEE Internet Things J. (2024)
Keyphrases
- authentication scheme
- security analysis
- wireless sensor networks
- key management
- smart card
- public key
- user authentication
- image encryption
- authentication protocol
- elliptic curve cryptography
- high security
- secret key
- security requirements
- sensor networks
- security model
- sensor nodes
- mutual authentication
- security properties
- energy consumption
- encryption scheme
- resource constrained
- information security
- lightweight
- key distribution
- provably secure
- cost effective
- information systems