A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions.
Patruni Muralidhara RaoBakkiam David DeebakPublished in: Ad Hoc Networks (2023)
Keyphrases
- future directions
- key management
- countermeasures
- key distribution
- lessons learned
- symmetric key
- current challenges
- security services
- identity based cryptography
- key management scheme
- authentication scheme
- information security
- secure communication
- wireless sensor networks
- resource constrained
- group communication
- ad hoc networks
- security protocols
- digital signature
- security measures
- secret key
- security threats
- security mechanisms
- provably secure
- case study
- user authentication
- key establishment
- secret sharing scheme
- authentication protocol
- encryption decryption
- public key cryptography
- end to end
- sensitive data
- resource constraints
- routing protocol
- privacy preserving
- low cost
- bilinear pairings
- data mining