A Robust, Low-Cost and Secure Authentication Scheme for IoT Applications

The edge devices connected to the Internet of Things (IoT) infrastructures are increasingly susceptible to piracy. These pirated edge devices pose a serious threat to security, as an adversary can get access to the private network through these non-authentic devices. It is necessary to authenticate...

Full description

Bibliographic Details
Main Authors: Md Jubayer al Mahmod, Ujjwal Guin
Format: Article
Language:English
Published: MDPI AG 2020-03-01
Series:Cryptography
Subjects:
Online Access:https://www.mdpi.com/2410-387X/4/1/8