Terminal independent security token derivation scheme for ultra-dense IoT networks.
Vincent Omollo NyangaresiPublished in: Array (2022)
Keyphrases
- security problems
- key management
- computer networks
- key distribution
- security analysis
- security issues
- social networks
- high security
- authentication scheme
- security model
- security requirements
- information security
- management system
- identity based cryptography
- cloud computing
- key management scheme
- network management
- access control
- network structure
- enterprise network
- elliptic curve cryptography
- protection scheme
- provably secure
- secure communication
- digital signature scheme
- complex networks
- statistical databases
- network security
- electronic voting
- authentication mechanism
- metro ethernet
- key agreement
- ns simulator
- key agreement protocol
- elliptic curve
- mobile nodes
- heterogeneous networks
- security policies
- ad hoc networks
- routing protocol
- intrusion detection
- wireless sensor networks