Scalable, password-based and threshold authentication for smart homes.
Andrea HusztiSzabolcs KovácsNorbert OláhPublished in: Int. J. Inf. Sec. (2022)
Keyphrases
- smart home
- user authentication
- authentication protocol
- security analysis
- context aware
- activity recognition
- assisted living
- home automation
- ambient intelligence
- lightweight
- authentication scheme
- intelligent environments
- home environment
- energy aware
- ambient assisted living
- key agreement
- intelligent systems
- smart environments
- ubiquitous environments
- key exchange
- home environments
- public key
- information security
- smart card
- intelligent agents
- embedded systems
- machine learning
- artificial intelligence