Security analysis of existing IoT key management protocols.
Sarra NaouiMohamed Elhoucine ElhdhiliLeïla Azouz SaïdanePublished in: AICCSA (2016)
Keyphrases
- key management
- security analysis
- key distribution
- symmetric key
- security protocols
- key establishment
- authentication protocol
- secret key
- security properties
- security services
- smart card
- public key
- resource constrained
- wireless sensor networks
- ad hoc networks
- group communication
- encryption scheme
- security requirements
- secret sharing scheme
- digital signature
- security model
- private key
- authentication scheme
- provably secure
- secure communication
- standard model
- user authentication
- elliptic curve
- signature scheme
- wireless networks
- ciphertext
- diffie hellman
- web services
- low cost