Efficient authentication of resource-constrained IoT devices based on ECQV implicit certificates and datagram transport layer security protocol.
Duy An HaKha Tho NguyenJohn K. ZaoPublished in: SoICT (2016)
Keyphrases
- resource constrained
- security mechanisms
- security protocols
- key management
- security services
- public key infrastructure
- resource constraints
- rfid tags
- authentication protocol
- embedded systems
- sensor networks
- wireless sensor networks
- cost effective
- transport layer
- end to end
- access control
- smart card
- multipath
- data streams
- cloud computing
- e government
- application layer
- network layer
- digital libraries