End-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication.
Jorge GranjalEdmundo MonteiroJorge Sá SilvaPublished in: Networking (2013)
Keyphrases
- end to end
- transport layer
- public key
- elliptic curve cryptography
- public key cryptography
- security analysis
- internet protocol
- private key
- transport protocol
- authentication scheme
- elliptic curve
- authentication protocol
- application layer
- network layer
- secret key
- sensor networks
- signature scheme
- ad hoc networks
- encryption scheme
- rfid tags
- wireless ad hoc networks
- congestion control
- error correction
- real time
- physical layer
- multipath
- provably secure
- computer networks
- cross layer
- ip address
- network congestion
- smart card
- security services
- security requirements
- security mechanisms