Copyright © 2011 A. Roy-Chowdhury and J. S. Baras. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. We describe a new class of lightweight, symmetric-key digital certificates called extended TESLA certificates and a source authentication protocol for wireless group communication that is based on the certificate. The certificate binds the identity of a wireless smart device to the anchor element of its key chain; keys from the chain are used for computing message authentication codes (MACs) on messages sourced by the device. The authentication protocol requires a centralized inf...
The Internet of Things (IoT) alludes to interestingly identifiable items (things) which can communic...
The Evolved Packet System-based Authentication and Key Agreement (EPS-AKA) protocol of the long-term...
We propose mutual authentication and session key exchange protocols based on certificates for the In...
Abstract—In this paper, we describe an efficient authentication protocol for group communication in ...
Abstract — In this work, we analyze and extend a recently proposed design of digital certificates ca...
[[abstract]]With rapid growth of mobile wireless networks, many mobile applications have received si...
The concept of the Internet of Things is driven by advancements of the Internet with the interconnec...
Wireless sensor networks consist of a large number of distributed sensor nodes so that potential ris...
The Internet-of-Things (IoT) will connect different types of cyber physical systems that are support...
[EN] One of the main challenges for the development of the Internet of Things is the authentication ...
As an extension of the wired network, the use of the wireless communication network has considerably...
[[abstract]]Secure group communication is an important research issue for network security because o...
[[abstract]]In this article, the authors shall propose a simple and efficient authentication scheme ...
The tremendous development in wireless technology has lead to accessing abundant information at one'...
We propose a novel approach to establish cryptographic keys among mobile users and a networking infr...
The Internet of Things (IoT) alludes to interestingly identifiable items (things) which can communic...
The Evolved Packet System-based Authentication and Key Agreement (EPS-AKA) protocol of the long-term...
We propose mutual authentication and session key exchange protocols based on certificates for the In...
Abstract—In this paper, we describe an efficient authentication protocol for group communication in ...
Abstract — In this work, we analyze and extend a recently proposed design of digital certificates ca...
[[abstract]]With rapid growth of mobile wireless networks, many mobile applications have received si...
The concept of the Internet of Things is driven by advancements of the Internet with the interconnec...
Wireless sensor networks consist of a large number of distributed sensor nodes so that potential ris...
The Internet-of-Things (IoT) will connect different types of cyber physical systems that are support...
[EN] One of the main challenges for the development of the Internet of Things is the authentication ...
As an extension of the wired network, the use of the wireless communication network has considerably...
[[abstract]]Secure group communication is an important research issue for network security because o...
[[abstract]]In this article, the authors shall propose a simple and efficient authentication scheme ...
The tremendous development in wireless technology has lead to accessing abundant information at one'...
We propose a novel approach to establish cryptographic keys among mobile users and a networking infr...
The Internet of Things (IoT) alludes to interestingly identifiable items (things) which can communic...
The Evolved Packet System-based Authentication and Key Agreement (EPS-AKA) protocol of the long-term...
We propose mutual authentication and session key exchange protocols based on certificates for the In...