Secure Transmission in NOMA-enabled Industrial IoT with Resource-Constrained Untrusted Devices.
Sapna ThaparDeepak MishraRavikant SainiPublished in: CoRR (2023)
Keyphrases
- resource constrained
- key management
- security mechanisms
- embedded systems
- wireless sensor networks
- resource constraints
- sensor networks
- visual sensor networks
- resource limitations
- rfid tags
- mobile devices
- third party
- multipath
- sensitive data
- sensor nodes
- privacy preserving
- security policies
- energy consumption
- smart objects
- data sets