An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.
Ki-Wook KimYoun-Hee HanSung-Gi MinPublished in: Sensors (2017)
Keyphrases
- key management
- resource constrained
- key distribution
- security mechanisms
- security services
- identity based cryptography
- resource constraints
- wireless sensor networks
- secure communication
- embedded systems
- sensor networks
- digital signature
- security protocols
- key management scheme
- rfid tags
- multipath
- authentication protocol
- provably secure
- mobile devices
- elliptic curve
- public key cryptography
- sensor nodes
- low cost
- digital libraries