Keyphrases
Latency
100%
IoT Environment
100%
Continuous Authentication
100%
Authentication Protocol
28%
Sensing Capability
14%
Attacker
14%
Experimental Validation
14%
Security Threats
14%
Network Delay
14%
Data Sharing
14%
Plethora
14%
Token
14%
Network Characteristics
14%
IoT Devices
14%
Computing Capabilities
14%
Low Entropy
14%
Device-to-device
14%
Enhanced Security
14%
Random Seed
14%
Trustworthiness
14%
SCADA
14%
Resource-constrained Devices
14%
Battery Level
14%
Session Hijacking
14%
Access Management
14%
Battery Placement
14%
Impersonation Attack
14%
Authentication Module
14%
Device Fingerprinting
14%
NextCloud
14%
Computer Science
Authentication
100%
Authentication Protocol
40%
Attackers
20%
Device-To-Device
20%
Enhanced Security
20%
Constrained Device
20%
Exchanged Message
20%
Characteristic Network
20%
Access Management
20%
Session Hijacking
20%
Authentication Module
20%