Reinforcement of IoT Open Platform Security using PUF -based Device Authentication.
Byoung-Koo KimSeungyong YoonYousung KangPublished in: ICTC (2022)
Keyphrases
- virtual private network
- electronic devices
- security mechanisms
- security problems
- security requirements
- identity authentication
- user authentication
- authentication protocol
- authentication mechanism
- data encryption
- security analysis
- security issues
- integrity verification
- key management
- authentication systems
- fuzzy vault
- reinforcement learning
- identity management
- factor authentication
- management system
- encryption decryption
- network security
- cloud computing
- authentication scheme
- identity based cryptography
- security policies
- access control
- key agreement
- smart card
- information security
- security systems
- biometric data
- high security
- key distribution
- trust negotiation
- public key infrastructure
- security services
- biometric authentication
- rfid systems
- intrusion detection
- secure communication
- secret key
- key agreement protocol
- mutual authentication
- rfid tags
- network management
- elliptic curve cryptography
- big data
- rights management
- mobile applications
- wireless local area network
- resource constrained
- computing platform
- image authentication
- elliptic curve
- security level
- wireless sensor