Secure authentication and key establishment in the SIP architecture.
Lukas MalinaMartin ZukalPublished in: TSP (2011)
Keyphrases
- key establishment
- symmetric key
- key management
- sensor networks
- security analysis
- wireless sensor networks
- pairwise
- security mechanisms
- key distribution
- security requirements
- session initiation protocol
- user authentication
- resource constrained
- authentication and key agreement
- security protocols
- software architecture
- secret key
- security model
- security services
- public key cryptography
- ad hoc networks
- elliptic curve
- authentication protocol
- digital signature
- secure communication
- access control
- smart card
- operating system
- sensor data
- formal model
- energy consumption