Articles with "key establishment" as a keyword



Photo by yapics from unsplash

CHIP: Collaborative Host Identity Protocol with Efficient Key Establishment for Constrained Devices in Internet of Things

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Personal Communications"

DOI: 10.1007/s11277-017-4176-5

Abstract: The Internet of Things (IoT) is the next evolutionary paradigm of networking technologies that interconnects almost all the smart objects and intelligent sensors related to human activities, machineries, and environment. IoT technologies and Internet Protocol… read more here.

Keywords: protocol; internet things; host identity; key establishment ... See more keywords
Photo from wikipedia

Provable Secure Group Key Establishment Scheme for Fog Computing

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3130471

Abstract: In the fog computing paradigms, fog nodes are closer to terminal devices and can extend services to the edge of the network, thereby reducing the impact of high latency and restricted networks in the Internet… read more here.

Keywords: group; scheme; group key; fog computing ... See more keywords
Photo by hudsoncrafted from unsplash

Trajectory-Based Authenticated Key Establishment for Dynamic Internet of Things

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3215688

Abstract: In Internet of Things (IoT), cryptography-based security services are widely used to mitigate security threats. However, establishing cryptographic keys between entities in dynamic IoTs is a challenging issue, due to the high mobility of these… read more here.

Keywords: authenticated key; key establishment; based authenticated; trajectory based ... See more keywords
Photo from wikipedia

A Lightweight and Robust Secure Key Establishment Protocol for Internet of Medical Things in COVID-19 Patients Care

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2020.3047662

Abstract: Due to the outbreak of COVID-19, the Internet of Medical Things (IoMT) has enabled the doctors to remotely diagnose the patients, control the medical equipment, and monitor the quarantined patients through their digital devices. Security… read more here.

Keywords: protocol; internet medical; establishment protocol; internet ... See more keywords
Photo from wikipedia

Remote key establishment by random mode mixing in multimode fibers and optical reciprocity

Sign Up to like & get
recommendations!
Published in 2019 at "Optical Engineering"

DOI: 10.1117/1.oe.58.1.016105

Abstract: Abstract. Disorder and scattering in photonic systems have long been considered a nuisance that should be circumvented. Recently, disorder has been harnessed for a rapidly growing number of applications, including imaging, sensing, and spectroscopy. The… read more here.

Keywords: optical reciprocity; mode mixing; random mode; multimode fibers ... See more keywords

Group Key Establishment in a Quantum-Future Scenario

Sign Up to like & get
recommendations!
Published in 2020 at "Informatica"

DOI: 10.15388/20-infor427

Abstract: In cryptography, key establishment protocols are often the starting point paving the way towards secure execution of different tasks. Namely, the parties seeking to achieve some cryptographic task, often start by establishing a common high-entropy… read more here.

Keywords: quantum; group key; key establishment; establishment quantum ... See more keywords
Photo from wikipedia

Optimization of Keys Using Grey-Wolf Optimization for Secure Path Key Establishment Schemes in Wireless Sensor Networks

Sign Up to like & get
recommendations!
Published in 2021 at "International Journal of Intelligent Engineering and Systems"

DOI: 10.22266/ijies2021.0630.01

Abstract: Security of Wireless Sensor Node (WSN) is an important issue due to inherited nature and uncontrolled operation, which makes it vulnerable to many attacks Sybil attacks, denial of service attacks, etc. The main issue related… read more here.

Keywords: optimization; key establishment; path; path key ... See more keywords