SAKMS: A Secure Authentication and Key Management Scheme for IETF 6TiSCH Industrial Wireless Networks Based on Improved Elliptic-Curve Cryptography.
Wei YangChengqi HouYu WangZhiming ZhangXinlong WangYuanlong CaoPublished in: IEEE Trans. Netw. Sci. Eng. (2024)
Keyphrases
- wireless networks
- key management
- elliptic curve cryptography
- ad hoc networks
- key management scheme
- elliptic curve
- authentication scheme
- public key cryptography
- key distribution
- provably secure
- wireless ad hoc networks
- security analysis
- security services
- wireless communication
- wireless sensor networks
- digital signature
- routing algorithm
- secure communication
- secret key
- diffie hellman
- public key
- base station
- high security
- mobile networks
- security protocols
- user authentication
- mobile ad hoc networks
- authentication protocol
- private key
- resource constrained
- security requirements
- peer to peer
- cost effective