WSN node access authentication protocol based on trusted computing.
Jing LiuLihui LiuZenghui LiuYingxu LaiHua QinShiyao LuoPublished in: Simul. Model. Pract. Theory (2022)
Keyphrases
- authentication protocol
- trusted computing
- wireless sensor networks
- smart card
- computing platform
- security analysis
- security protocols
- public key
- computer security
- computing environments
- real time
- resource constrained
- lightweight
- cloud computing
- computer systems
- access control
- security requirements
- rfid tags
- hash functions
- access control policies
- low cost
- rfid systems
- peer to peer