An Optimized Security Vehicular Internet of Things -IoT-Application Layer Protocols MQTT and COAP Based on Cryptographic Elliptic-Curve.
Sanaa El AidiAbderrahim BajitAnass BarodiHabiba ChaouiAhmed TamtaouiPublished in: ICECOCS (2020)
Keyphrases
- elliptic curve
- application layer
- key management
- security protocols
- key distribution
- elliptic curve cryptography
- security services
- security properties
- diffie hellman
- public key cryptosystems
- public key cryptography
- digital signature
- transport layer
- key agreement protocol
- ad hoc networks
- end to end
- key exchange
- key agreement
- wireless sensor networks
- network layer
- resource constrained
- scalar multiplication
- video streaming
- secure communication
- physical layer
- cryptographic protocols
- secret key
- provably secure
- key technologies
- ddos attacks
- authentication protocol
- location information
- private key
- public key
- authentication scheme
- access control
- trusted third party
- efficient computation
- security analysis
- encryption scheme
- web services