Login / Signup
A Trusted Security Key Management Server in LoRaWAN: Modelling and Analysis.
Koketso Ntshabele
Bassey Isong
Naison Gasela
Adnan M. Abu-Mahfouz
Published in:
J. Sens. Actuator Networks (2022)
Keyphrases
</>
key management
identity based cryptography
security threats
wireless sensor networks
resource constrained
security protocols
key management scheme
security services
low cost
ad hoc networks
secure communication
access control
cost effective
group communication
signcryption scheme