Implementation of high speed and lightweight symmetric key encryption algorithm-based authentication protocol for resource constrained devices.
R. RajashreeVijayakumar PeroumalLalit KishoreK. Venkata Diwakar ReddySrujan ReddyM. JagannathPublished in: Int. J. Electron. Secur. Digit. Forensics (2022)
Keyphrases
- resource constrained
- lightweight
- rfid tags
- encryption algorithm
- authentication protocol
- security analysis
- public key
- key management
- wireless sensor networks
- security protocols
- security mechanisms
- encryption scheme
- smart card
- pseudorandom
- sensor networks
- security issues
- secret key
- low cost
- sensor nodes
- s box
- digital content
- key distribution
- real time
- embedded systems
- digital signature