Merkle hash tree improved strongly constrained discrete hashing function-based authentication scheme for enabling security for smart home IoT applications.
K. Swapna SudhaN. JeyanthiPublished in: Peer Peer Netw. Appl. (2023)
Keyphrases
- authentication scheme
- smart home
- hash functions
- secret key
- user authentication
- authentication protocol
- hash table
- security flaws
- hashing algorithm
- key management
- smart card
- context aware
- b tree
- ambient intelligence
- activity recognition
- security analysis
- management system
- data structure
- public key
- human activities
- hashing methods
- embedded systems
- intelligent agents
- intrusion detection
- lightweight
- intelligent systems
- encryption scheme
- sensor data
- similarity search
- real time