Browsing by Subject "Security authentication method"
Now showing items 1-1 of 1
-
An end-to-end authentication method for NB-IoT devices over 5G network using whirlpool hash function and physical unclonable function
(Brac University, 2021-01)The Narrow-band Internet of Things (NB-IoT) is a high throughput and Low Power Con- sumption Wide Area Network (LPWAN) radio technology, introduced by 3rd Generation Partnership Project (3GPP). The NB-IoT and LTE-M ...