Evaluating Secure Variants of the MQTT Protocol on Resource-Constraint Devices for Precision Agriculture.
Mislav HasMario KusekIvana Podnar ZarkoPublished in: ConTEL (2023)
Keyphrases
- precision agriculture
- cryptographic protocols
- covert channel
- authentication protocol
- security protocols
- key distribution
- mobile agent system
- scalar product
- secure routing
- lightweight
- key exchange protocol
- resource constraints
- provably secure
- security analysis
- group communication
- data mining
- key agreement protocol
- mutual authentication
- communication infrastructure
- vertically partitioned data
- key exchange
- homomorphic encryption
- password authentication
- mobile devices
- security properties
- privacy preserving
- multi party
- rfid systems
- secure multi party
- network devices
- user privacy
- diffie hellman
- security model
- resource allocation
- secure multiparty computation
- resource management
- key agreement
- key establishment
- authentication scheme
- smart card
- rfid tags
- secure communication
- mobile applications
- ad hoc networks
- security issues
- security requirements
- sensitive data
- elliptic curve