A Lightweight Authentication and Key Exchange Protocol for IoT
暂无分享,去创建一个
Koushik Kar | Elizabeth Liri | Kadangode K. Ramakrishnan | Abdulrahman Bin-Rabiah | K. Ramakrishnan | K. Kar | E. Liri | Abdulrahman Bin-Rabiah
[1] Donald F. Towsley,et al. Secure Wireless Communication with Dynamic Secrets , 2010, 2010 Proceedings IEEE INFOCOM.
[2] Philippas Tsigas,et al. ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System , 2009, NordSec.
[3] Frédéric Valette,et al. On the Security of the CCM Encryption Mode and of a Slight Variant , 2008, ACNS.
[4] Biplab Sikdar,et al. Secure Data Provenance for the Internet of Things , 2017, IoTPTS@AsiaCCS.
[5] Ki-Hyung Kim,et al. SAKES: Secure authentication and key establishment scheme for M2M communication in the IP-based wireless sensor network (6L0WPAN) , 2013, 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN).
[6] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[7] Andrei V. Gurtov,et al. PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications , 2014, Int. J. Distributed Sens. Networks.
[8] Maode Ma,et al. A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks , 2016, IEEE Transactions on Industrial Informatics.
[9] Prerna Mahajan,et al. A Study of Encryption Algorithms AES, DES and RSA for Security , 2013 .
[10] Srivaths Ravi,et al. Analyzing the energy consumption of security protocols , 2003, ISLPED '03.
[11] Hugo Krawczyk,et al. Cryptographic Extraction and Key Derivation: The HKDF Scheme , 2010, IACR Cryptol. ePrint Arch..