Cryptographic Keys Generating and Renewing System for IoT Network Nodes—A Concept
Citations
34 citations
1 citations
1 citations
References
14,980 citations
Additional excerpts
..., according to the Diffie–Hellmann scheme [1]....
[...]
1,391 citations
"Cryptographic Keys Generating and R..." refers background in this paper
...An example of such a bot is Mirai malware [29]....
[...]
596 citations
524 citations
"Cryptographic Keys Generating and R..." refers background in this paper
...These requirements are easy to meet by stationary nodes, but are a big challenge for usually mobile, using wireless links and battery-powered nodes of sensor network, which currently constitute a very large population of IoT network nodes [5,6]....
[...]
461 citations
"Cryptographic Keys Generating and R..." refers background in this paper
...Regarding N nodes, the following assumptions were made [27]: • Node N is a class 1 (RAM << 10 KB and Flash << 100KB) or class 2 device (RAM ~ 10 KB and Flash ~ 100KB) constrained device; • Node N is powered by a class E1 energy source (i....
[...]
...Regarding N nodes, the following assumptions were made [27]: • Node N is a class 1 (RAM << 10 KB and Flash << 100 KB) or class 2 device (RAM ~ 10 KB and Flash ~ 100 KB) constrained device; • Node N is powered by a class E1 energy source (i....
[...]