A Secure and Efficient Protocol for LoRa Using Cryptographic Hardware Accelerators.
Steven PuckettJianqing LiuSeong-Moo YooThomas H. MorrisPublished in: IEEE Internet Things J. (2023)
Keyphrases
- cryptographic protocols
- security protocols
- provably secure
- key management
- lightweight
- security properties
- cryptographic algorithms
- agent technology
- key exchange protocol
- secure communication
- group communication
- homomorphic encryption
- covert channel
- security analysis
- elliptic curve cryptography
- diffie hellman
- key distribution
- elliptic curve
- standard model
- encryption scheme
- authentication scheme
- international conference
- decision making
- digital signature
- authentication protocol
- encryption key
- public key encryption