Secure and low-power authentication for resource-constrained devices.
Mohit SethiPranvera KortoçiMario Di FrancescoTuomas AuraPublished in: IOT (2015)
Keyphrases
- resource constrained
- security mechanisms
- low power consumption
- low power
- low cost
- embedded systems
- rfid tags
- power consumption
- key management
- wireless sensor networks
- authentication protocol
- resource constraints
- high speed
- sensor networks
- single chip
- mobile devices
- gate array
- digital signal processing
- security issues
- multipath
- image quality
- cost effective
- sensor data
- lightweight
- vlsi circuits
- real time