Optimal and secure protocols in the IETF 6TiSCH communication stack.
Nicola AccetturaGiuseppe PiroPublished in: ISIE (2014)
Keyphrases
- multi party
- communication protocols
- group communication
- security protocols
- optimal solution
- communication protocol
- authentication protocol
- cryptographic protocols
- communication cost
- security analysis
- lightweight
- worst case
- key distribution
- secure communication
- fault tolerance
- privacy preserving
- standard model
- wireless sensor networks
- database systems
- key exchange
- trusted third party