Login / Signup
Secure Transmission in NOMA-Enabled Industrial IoT With Resource-Constrained Untrusted Devices.
Sapna Thapar
Deepak Mishra
Ravikant Saini
Published in:
IEEE Trans. Ind. Informatics (2024)
Keyphrases
</>
resource constrained
key management
security mechanisms
embedded systems
wireless sensor networks
sensor networks
resource constraints
rfid tags
resource limitations
visual sensor networks
third party
multipath
mobile devices
sensitive data
lightweight
low cost
leader follower