On the Security-Reliability and Secrecy Throughput of Random Mobile User in Internet of Things.
Jie TangHong WenHuanhuan SongTengyue ZhangKaiyu QinPublished in: IEEE Internet Things J. (2020)
Keyphrases
- mobile users
- mobile devices
- mobile computing
- mobile commerce
- key management
- mobile phone
- security properties
- context aware
- mobile environments
- mobile applications
- location dependent
- security analysis
- user mobility
- mobile networks
- base station
- security requirements
- information sources
- location based services
- key distribution
- mobile agents
- information security
- mobile services
- internet access
- network security
- ubiquitous computing
- response time
- multimedia services
- cellular networks
- access control
- security policies
- location management
- mutual authentication
- network management
- wireless sensor networks
- wireless networks
- security protocols
- key technologies
- database systems