A Lightweight Authenticated Key Agreement Scheme for Resource-Constrained Devices Based on Implicit Certificates and Finite Graphs.
Mounirah Djam-DoudouAdo Adamou Abba AriHortense Boudjou TchapgnouoAbdelhak Mourad GuérouiAlidou MohamadouNabila LabraouiOusmane ThiarePublished in: SAFER-TEA (2023)
Keyphrases
- lightweight
- resource constrained
- rfid tags
- wireless sensor networks
- public key
- authentication protocol
- communication infrastructure
- sensor networks
- resource constraints
- security mechanisms
- embedded systems
- key management
- handheld devices
- key agreement protocol
- multipath
- energy consumption
- security analysis
- low cost
- diffie hellman
- provably secure
- sensor nodes
- access control
- secret sharing scheme
- public key cryptography
- private key
- modular exponentiation
- key distribution
- security model
- mobile devices
- security issues