Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis.
Haowen TanYuanzhao SongShichang XuanSung Bum PanIlyong ChungPublished in: Symmetry (2019)
Keyphrases
- behavior analysis
- user authentication
- authentication scheme
- identity management
- authentication protocol
- authentication mechanism
- security requirements
- security mechanisms
- key distribution
- security analysis
- factor authentication
- anomaly detection
- surveillance system
- private key
- data encryption
- secure manner
- integrity verification
- sensor networks
- password authentication
- social insects
- mobile applications
- behavioral model
- public key
- smart card
- mobile devices
- key management
- key agreement protocol
- security issues
- access control
- rights management