Integrating PHY Security Into NDN-IoT Networks By Exploiting MEC: Authentication Efficiency, Robustness, and Accuracy Enhancement.
Peng HaoXianbin WangPublished in: IEEE Trans. Signal Inf. Process. over Networks (2019)
Keyphrases
- computational efficiency
- security mechanisms
- security problems
- authentication protocol
- computational complexity
- identity authentication
- security requirements
- high accuracy
- security analysis
- social networks
- security issues
- fuzzy vault
- key management
- network structure
- authentication mechanism
- identity management
- user authentication
- management system
- data encryption
- high security
- security services
- biometric data
- encryption decryption
- security systems
- access control
- security policies
- wireless local area network
- image enhancement
- identity based cryptography
- security properties
- security level
- resource constrained
- intrusion detection
- information security