A two‐layer attack‐robust protocol for IoT healthcare security

Abstract The majority of studies in the field of developing identification and authentication protocols for Internet of Things (IoT) used cryptographic algorithms. Using brain signals is also a relatively new approach in this field. EEG signal‐based authentication algorithms typically use feature ex...

Full description

Bibliographic Details
Main Authors: Sharafi Afsaneh, Adabi Sepideh, Movaghar Ali, Al‐Majeed Salah
Format: Article
Language:English
Published: Wiley 2021-12-01
Series:IET Communications
Subjects:
Online Access:https://doi.org/10.1049/cmu2.12278