Drone Authentication Using ID-Based Signcryption in LoRaWAN Network.
Sana BenzartiBayrem TrikiOuajdi KorbaaPublished in: ISDA (2019)
Keyphrases
- signcryption scheme
- network traffic
- key management
- complex networks
- key distribution
- network structure
- bilinear pairings
- trusted third party
- identity based cryptography
- ring signature
- computer networks
- security analysis
- network access
- authentication scheme
- standard model
- wireless sensor networks
- signature scheme
- end to end
- distributed systems