Rethinking IoT Security: A Protocol Based on Blockchain Smart Contracts for Secure and Automated IoT Deployments.
John WickströmMagnus WesterlundGöran PulkkisPublished in: CoRR (2020)
Keyphrases
- key management
- rfid systems
- key distribution
- security protocols
- security problems
- cryptographic protocols
- provably secure
- authentication protocol
- security requirements
- key agreement protocol
- group communication
- security issues
- security analysis
- covert channel
- security mechanisms
- smart objects
- security services
- key establishment
- security properties
- key management scheme
- key exchange protocol
- management system
- security model
- cloud computing
- secure communication
- mutual authentication
- diffie hellman
- wireless sensor networks
- resource constrained
- secure routing
- ad hoc networks
- cryptographic algorithms
- smart grid
- rfid tags
- security level
- electronic voting
- session key
- secure multiparty computation
- elliptic curve
- mobile agent system
- data security
- homomorphic encryption
- secret key
- information security
- key agreement
- advanced metering infrastructure
- rfid technology
- key exchange
- public key
- trusted third party
- smart card
- password authentication
- security measures
- security management
- user authentication
- semi honest
- location information
- standard model
- digital signature
- lightweight
- privacy preserving
- blind signature
- access control
- private key
- multi party
- smart home
- identity management
- public key cryptosystem
- mobile payment