Fast Authentication and Progressive Authorization in Large-Scale IoT: How to Leverage AI for Security Enhancement.
He FangAngie QiXianbin WangPublished in: IEEE Netw. (2020)
Keyphrases
- security requirements
- security problems
- access control
- security mechanisms
- trust negotiation
- security policies
- security analysis
- information security
- smart card
- artificial intelligence
- security model
- user authentication
- identity authentication
- identity management
- key management
- management system
- trust management
- data security
- encryption decryption
- security properties
- authentication mechanism
- security systems
- security services
- authentication protocol
- access requests
- key distribution
- factor authentication
- expert systems
- authentication scheme
- integrity verification
- trust relationships
- role assignment
- public key infrastructure
- data encryption
- elliptic curve cryptography
- access control systems
- access control policies
- authentication systems
- biometric data
- intrusion detection
- resource constrained
- security protocols
- public key cryptography
- role based access control
- electronic payment
- security issues
- private key
- cloud computing
- virtual private network