Establishing End-to-End Secure Channel for IoT Devices through an Untrusted C-ITS Network.
Simon BougetShahid RazaMartin FuruhedPublished in: VEHITS (2021)
Keyphrases
- end to end
- packet loss rate
- congestion control
- wireless ad hoc networks
- internet protocol
- high bandwidth
- transport layer
- rate allocation
- rate adaptation
- end to end quality of service
- multipath
- key management
- ad hoc networks
- admission control
- communication networks
- application layer
- differentiated services
- peer to peer
- scalable video
- mobile devices
- network bandwidth
- error propagation
- computer networks
- network traffic
- image quality
- text localization and recognition