HIGHLIGHTS
SUMMARY
An important aspect regarding the security of a system that embraces IoT devices is the IoT devices themselves, as they can be a sensitive component of the system. In, the 4 of 18 authors involve the physical layer of the IoT system within the authentication process and the process of authentication involves hyperelliptic curves. Even if an attacker captures a query authentication and saves it for later use, or even if the IoT device stores the current query authentication, it cannot be used for further authentication queries because every time the IoT device computes . . .
If you want to have access to all the content you need to log in!
Thanks :)
If you don't have an account, you can create one here.