Cyber Security Protocol for Secure Traffic Monitoring Systems using PUF-based Key Management.
Vikramkumar PudiSrinivasu BodapatiSachin KumarAnupam ChattopadhyayPublished in: iSES (2020)
Keyphrases
- monitoring system
- key management
- cyber security
- key distribution
- provably secure
- security protocols
- group communication
- intrusion detection
- key establishment
- network traffic
- key management scheme
- smart grid
- ad hoc networks
- wireless sensor networks
- resource constrained
- intrusion detection system
- network security
- secure communication
- diffie hellman
- elliptic curve
- security issues
- cryptographic protocols
- digital signature
- secret key
- authentication protocol
- real time
- computer networks
- network management
- wireless networks
- lightweight
- sensor networks
- mobile devices
- data mining