Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication.
Kobra MabodiMehdi YusefiShahram ZandiyanLeili IrankhahReza FotohiPublished in: J. Supercomput. (2020)
Keyphrases
- security threats
- key management
- security mechanisms
- smart card
- security protocols
- identity management
- resource constrained
- information security
- wireless sensor networks
- security issues
- ad hoc networks
- big data
- databases
- access control
- smart objects
- security requirements
- data model
- mobile devices
- security risks
- trust model
- location information
- secret key
- cloud computing
- personal information
- management system
- public key cryptography
- database
- operating system
- sensitive data
- sensor networks
- database systems