Two-Tier Device-Based Authentication Protocol Against PUEA Attacks for IoT Applications.
Shih-Chang LinChih-Yu WenWilliam A. SetharesPublished in: IEEE Trans. Signal Inf. Process. over Networks (2018)
Keyphrases
- authentication protocol
- security protocols
- cryptographic protocols
- rfid tags
- rfid systems
- key management
- smart card
- security problems
- security mechanisms
- security analysis
- lightweight
- public key
- user authentication
- radio frequency identification
- authentication scheme
- resource constrained
- password authentication
- wireless sensor networks
- cloud computing
- rfid technology
- secret key
- hash functions
- cost effective
- context aware