Wireless Transceiver Aided Run-Time Secret Key Extraction for IoT Device Security.
Mi-Kyung OhSangjae LeeYousung KangDooho ChoiPublished in: IEEE Trans. Consumer Electron. (2020)
Keyphrases
- secret key
- key management
- security level
- ultra low power
- encryption decryption
- stream cipher
- session key
- authentication scheme
- encryption scheme
- secure communication
- smart card
- key distribution
- key agreement
- rfid tags
- diffie hellman
- private key
- authentication protocol
- low power
- public key
- pseudorandom
- security protocols
- key establishment
- mutual authentication
- hash functions
- wireless networks
- digital signature
- information security
- wireless communication
- key management scheme
- block cipher
- security requirements
- rfid systems
- ciphertext
- security problems
- wireless systems
- forward secure
- elliptic curve
- key exchange
- security mechanisms
- location information
- access control
- low cost
- security properties
- mobile devices
- security analysis
- mobile users
- network security
- ad hoc networks
- power consumption
- cost effective
- sensor networks