Application Layer Key Establishment for End-to-End Security in IoT.
Salvador PérezJosé Luis Hernández RamosShahid RazaAntonio F. SkarmetaPublished in: IEEE Internet Things J. (2020)
Keyphrases
- end to end
- application layer
- key establishment
- key management
- ad hoc networks
- sensor networks
- network layer
- wireless sensor networks
- physical layer
- transport layer
- network topology
- wireless ad hoc networks
- cross layer
- secret key
- resource constrained
- multipath
- congestion control
- security protocols
- routing algorithm
- bandwidth allocation
- security analysis
- multi hop
- mobile ad hoc networks
- cloud computing
- sensor nodes
- security requirements
- information security