One Secure IoT Scheme for Protection of True Nodes.
Yongkai FanGuanqun ZhaoXiaodong LinXiaofeng SunDandan ZhuJing LeiPublished in: SmartCom (2018)
Keyphrases
- protection scheme
- key management
- authentication scheme
- management system
- secure communication
- secret sharing
- security analysis
- key establishment
- key distribution
- data protection
- public key encryption
- digital signature scheme
- protection schemes
- key management scheme
- provably secure
- secret sharing scheme
- security issues
- information security
- smart card
- security architecture
- key exchange
- secret key
- graph structure
- electronic voting
- authentication mechanism
- key agreement
- big data
- previously mentioned
- reed solomon codes
- shortest path