Secure End-to-End key establishment protocol for resource-constrained healthcare sensors in the context of IoT.
Muhammad A. IqbalMagdy A. BayoumiPublished in: HPCS (2016)
Keyphrases
- end to end
- resource constrained
- key management
- sensor networks
- multipath
- key establishment
- key distribution
- security mechanisms
- ad hoc networks
- wireless sensor networks
- diffie hellman
- wireless ad hoc networks
- resource constraints
- sensor nodes
- security protocols
- real time
- sensor data
- digital signature
- rfid tags
- group communication
- secure communication
- energy consumption
- lightweight
- cloud computing
- multi hop
- bit rate
- data collection
- data sets
- security requirements
- embedded systems
- elliptic curve