Secure protocol for wireless communication within internet of military things.
Jan ChudzikiewiczJanusz FurtakZbigniew ZielinskiPublished in: WF-IoT (2015)
Keyphrases
- wireless communication
- mobile communication
- protocol stack
- communication technologies
- remote control
- multiple access
- cryptographic protocols
- wireless networks
- covert channel
- communication networks
- security protocols
- tcp ip
- physical layer
- computer simulation
- wireless sensor networks
- authentication protocol
- security mechanisms
- wifi
- packet delivery
- key distribution
- wireless channels
- security analysis
- mobile terminals
- communication protocol
- fading channels
- internet access
- ip address
- cognitive radio
- intelligent transportation systems
- rfid systems
- key management
- security requirements
- wireless communication systems
- fourth generation
- communication systems
- embedded systems
- smart card