A two‐layer attack‐robust protocol for IoT healthcare security
Abstract The majority of studies in the field of developing identification and authentication protocols for Internet of Things (IoT) used cryptographic algorithms. Using brain signals is also a relatively new approach in this field. EEG signal‐based authentication algorithms typically use feature ex...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2021-12-01
|
Series: | IET Communications |
Subjects: | |
Online Access: | https://doi.org/10.1049/cmu2.12278 |