Secure and efficient scheme for fast initial link setup against key reinstallation attacks in IEEE 802.11ah networks.
Lyuye ZhangMaode MaPublished in: Int. J. Commun. Syst. (2020)
Keyphrases
- chosen plaintext
- provably secure
- secure communication
- security protocols
- block cipher
- encryption key
- security mechanisms
- cryptographic protocols
- destination node
- security model
- authentication scheme
- private key
- lightweight
- security analysis
- social networks
- secret sharing
- key distribution
- watermarking technique
- key management
- key management scheme
- resource constrained