Autonomous Mutual Authentication Protocol in the Edge Networks.
Ruey-Kai SheuMayuresh Sunil PardeshiLun-Chi ChenPublished in: Sensors (2022)
Keyphrases
- mutual authentication
- security analysis
- privacy protection
- authentication protocol
- rfid tags
- secret key
- authentication scheme
- trusted third party
- authentication mechanism
- public key
- security requirements
- rfid systems
- key agreement
- social networks
- privacy preserving
- lightweight
- user authentication
- private key
- security protocols
- wireless ad hoc networks
- computer networks
- database systems