End-to-End Security Scheme for Machine Type Communication Based on Generic Authentication Architecture.
Wujun ZhangYueyu ZhangJie ChenHui LiYumin WangPublished in: INCoS (2012)
Keyphrases
- end to end
- secure communication
- ad hoc networks
- authentication mechanism
- authentication scheme
- authentication protocol
- key agreement
- high bandwidth
- key distribution
- security analysis
- private key
- key management
- differentiated services
- security mechanisms
- security requirements
- user authentication
- wireless ad hoc networks
- smart card
- resource constrained
- secret key
- multipath
- graphical password
- communication protocol
- admission control
- public key
- security protocols
- diffie hellman
- packet loss rate
- congestion control
- real time
- information security
- application layer
- access control
- cross layer
- elliptic curve
- network security
- communication networks
- multiple description coding
- service management
- physical layer
- computer networks
- encryption scheme
- network management