Login / Signup

A two-level authentication scheme for clone node detection in smart cities using Internet of things.

Anitha ShanmugamJayanthi Paramasivam
Published in: Comput. Intell. (2020)
Keyphrases
  • authentication scheme
  • smart cities
  • user authentication
  • smart card
  • secret key
  • public key
  • smart city
  • mobile devices
  • anomaly detection
  • entry point
  • service integration
  • security flaws
  • information systems
  • big data