Security Evaluation of Authentication Requirements in IoT Gateways.
Diego R. GomesFernando Antônio Aires LinsObionor O. NóbregaEduardo F. FelixBruno A. JesusMarco VieiraPublished in: J. Netw. Syst. Manag. (2023)
Keyphrases
- security mechanisms
- functional requirements
- security requirements
- authentication mechanism
- security problems
- management system
- identity authentication
- identity management
- security model
- cloud computing
- data encryption
- user authentication
- security analysis
- encryption decryption
- high security
- fuzzy vault
- authentication systems
- big data
- security services
- security issues
- biometric data
- biometric authentication
- biometric recognition
- security systems
- key agreement protocol
- key management
- information security
- elliptic curve cryptography
- authentication scheme
- intrusion detection
- security properties
- identity based cryptography