Correction to: A secure authentication technique for connecting different IoT devices in the smart city infrastructure.
Rohit SharmaRajeev AryaPublished in: Clust. Comput. (2022)
Keyphrases
- smart city
- identity management
- authentication scheme
- user authentication
- authentication mechanism
- smart cities
- authentication protocol
- key management
- service integration
- security mechanisms
- data encryption
- cloud computing
- password authentication
- key distribution
- security services
- factor authentication
- integrity verification
- security requirements
- security analysis
- secure manner
- mobile devices
- security protocols
- rights management
- smart card
- secret key
- public key cryptography
- public key infrastructure
- user centered
- mobile terminals
- user centric
- rfid tags
- smart objects
- rfid systems
- metadata
- access control
- big data
- mobile applications
- personal information
- public key
- security policies
- security issues