MUP: Simplifying Secure Over-The-Air Update with MQTT for Constrained IoT Devices.
Kristina SahlmannVera ClemensMichael NowakBettina SchnorPublished in: Sensors (2021)
Keyphrases
- key management
- management system
- mobile devices
- smart objects
- user authentication
- security requirements
- mobile computing
- security issues
- intelligent environments
- security mechanisms
- big data
- embedded systems
- smart phones
- identity management
- rfid systems
- key distribution
- neural network
- ad hoc networks
- authentication scheme
- sensor networks
- data security
- security protocols
- wireless networks
- information security