Architecture of security association establishment based on bootstrapping technologies for enabling secure IoT infrastructures.
Salvador PérezDan García CarrilloRafael Marín LópezJosé Luis Hernández RamosRafael Marín-PérezAntonio F. SkarmetaPublished in: Future Gener. Comput. Syst. (2019)
Keyphrases
- security architecture
- key management
- security requirements
- security issues
- digital rights management
- security problems
- management system
- identity management
- security mechanisms
- security level
- security measures
- data security
- security model
- cloud computing
- security management
- network services
- access control
- application level
- security policies
- security services
- security protocols
- sensitive data
- security analysis
- public key encryption
- rfid systems
- software architecture
- information security
- computing infrastructure
- electronic voting
- cryptographic protocols
- data encryption
- computing platform
- intrusion detection
- encryption scheme
- security patterns
- data integrity
- wireless sensor networks
- key exchange
- trusted computing
- big data
- network security
- private key
- security properties
- authentication mechanism
- resource constrained
- key exchange protocol
- stream cipher
- network infrastructure
- integrity verification
- diffie hellman
- intrusion detection and prevention
- critical infrastructure
- provably secure
- data management
- key agreement protocol
- key agreement
- smart card
- secure communication
- ad hoc networks
- digital content
- authentication scheme
- location information
- user authentication
- open systems
- key distribution
- authentication protocol
- cyber security