An Encryption-Authentication Unified A/D Conversion Scheme for IoT Sensor Nodes.
Vinod V. GaddeHiromitsu AwanoMakoto IkedaPublished in: A-SSCC (2018)
Keyphrases
- key management
- wireless sensor networks
- symmetric key
- sensor nodes
- key distribution
- key establishment
- resource constrained
- sensor networks
- security protocols
- public key cryptography
- key management scheme
- secure communication
- authentication scheme
- secret sharing scheme
- elliptic curve cryptography
- security analysis
- base station
- energy consumption
- data transmission
- image authentication
- private key
- elliptic curve
- energy efficient
- location information
- public key
- wireless communication
- security mechanisms
- data aggregation
- provably secure
- sensor data
- diffie hellman
- energy efficiency
- resource limitations
- secret key
- secret sharing
- encryption scheme
- resource constraints
- routing protocol
- security services
- routing algorithm
- body sensor networks
- ad hoc networks
- digital signature
- data encryption
- security requirements
- wireless multimedia sensor networks
- sensed data
- data collection
- mobile sensor networks
- multi hop
- quality of service
- virtual private network
- wireless sensor nodes
- wireless networks
- authentication protocol
- smart card