Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain.
Mohammed AlshahraniIssa TraoréPublished in: J. Inf. Secur. Appl. (2019)
Keyphrases
- smart home
- access control
- mutual authentication
- security analysis
- security requirements
- access control policies
- data security
- authentication protocol
- privacy protection
- security mechanisms
- authentication scheme
- access control mechanism
- rfid tags
- security policies
- activity recognition
- ambient intelligence
- context aware
- secret key
- hash functions
- management system
- intelligent systems
- embedded systems
- smart card
- rfid systems
- human activities
- private key
- public key
- role based access control
- security issues
- low cost
- cloud computing
- multi agent