Encryption Protocol for Resource-Constrained Devices in Fog-Based IoT Using One-Time Pads.
Kwasi Boakye-BoatengEric KuadaEmmanuel Antwi-BoasiakoEmmanuel DjabaPublished in: IEEE Internet Things J. (2019)
Keyphrases
- resource constrained
- key management
- security protocols
- rfid tags
- rfid systems
- elliptic curve
- embedded systems
- resource constraints
- wireless sensor networks
- sensor networks
- authentication protocol
- security properties
- visual sensor networks
- lightweight
- security mechanisms
- cryptographic protocols
- resource limitations
- mobile devices
- low cost
- network devices
- multipath
- security analysis
- secret key
- power consumption
- key exchange