< Back to previous page

Publication

Symmetric key infrastructure for authenticated key establishment between resource constrained nodes and powerful devices

Journal Contribution - Journal Article

© 2016 John Wiley & Sons, Ltd. This paper presents a generic lightweight solution for authentication between powerful devices and resource constrained nodes. The approach is validated through the architectural design of multiple applications in different domains. The paper further discusses variants that might increase the usability of the approach in different settings. More precisely, the solution is tuned for open systems, closed systems and hierarchically structured systems. Further, two use cases are presented in which the open system and closed system approach is applied.
Journal: Security and Communication Networks
ISSN: 1939-0114
Issue: 2
Volume: 9
Pages: 106 - 117
Publication year:2016
BOF-keylabel:yes
IOF-keylabel:yes
BOF-publication weight:0.5
CSS-citation score:1
Authors from:Higher Education
Accessibility:Closed