Trusted Third Party Based Key Management for Enhancing LoRaWAN Security.
Sarra NaouiMohamed Elhoucine ElhdhiliLeïla Azouz SaïdanePublished in: AICCSA (2017)
Keyphrases
- key management
- trusted third party
- digital signature
- security services
- key distribution
- ad hoc networks
- identity based cryptography
- resource constrained
- security protocols
- wireless sensor networks
- key management scheme
- elliptic curve
- secret key
- private key
- wireless ad hoc networks
- security mechanisms
- key establishment
- authentication protocol
- security issues
- smart card
- third party