Two-Level-Composite-Hashing Facilitating Highly Efficient Anonymous IoT and D2D Authentication

Resource limitation is quite popular in many Internet of Things (IoT) devices and eavesdropping on the identities of IoT devices could reveal the sensitive information; therefore, high efficiency (computation and communication) and anonymity protection are two desirable properties in IoT authenticat...

Full description

Bibliographic Details
Main Author: Hung-Yu Chien
Format: Article
Language:English
Published: MDPI AG 2021-03-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/10/7/789