Secured-KDS: Secret key distribution and authentication scheme for resource-constrained devices.
Selvakumar ManickamShafiq Ul RehmanPublished in: IET Networks (2023)
Keyphrases
- resource constrained
- authentication scheme
- key distribution
- secret key
- key management
- rfid tags
- secret sharing scheme
- embedded systems
- smart card
- group communication
- resource constraints
- wireless sensor networks
- public key
- security mechanisms
- authentication protocol
- sensor networks
- low cost
- lightweight
- security protocols
- key agreement
- cost effective
- multipath
- diffie hellman
- elliptic curve
- private key
- information security
- software architecture
- sensor nodes
- data sets
- real time