A survey of key pre-distribution schemes based on combinatorial designs for resource-constrained devices in the IoT network.
Neda Solari EsfehaniHamid Haj Seyyed JavadiPublished in: Wirel. Networks (2021)
Keyphrases
- resource constrained
- key management
- wireless sensor networks
- key management scheme
- resource limitations
- sensor networks
- provably secure
- security mechanisms
- resource constraints
- wireless ad hoc networks
- embedded systems
- key distribution
- leader follower
- security protocols
- multipath
- network traffic
- sensor nodes
- secure communication
- routing algorithm
- data collection
- peer to peer