Symmetric key infrastructure for authenticated key establishment between resource constrained nodes and powerful devices.
Jan VossaertJorn LaponBart De DeckerVincent NaessensPublished in: Secur. Commun. Networks (2016)
Keyphrases
- resource constrained
- key establishment
- key management
- symmetric key
- key distribution
- wireless sensor networks
- sensor networks
- security mechanisms
- sensor nodes
- security services
- data collection
- embedded systems
- resource constraints
- rfid tags
- security protocols
- secret key
- energy consumption
- digital signature
- group communication
- content providers
- elliptic curve
- secure communication
- routing protocol
- real time
- sensor data
- provably secure
- pairwise
- data sets
- routing algorithm
- data streams
- private key
- software engineering
- low cost
- temporal constraints