E-mail

E-mail a Wiley Online Library Link

Jan Vossaert, Jorn Lapon, Bart De Decker and Vincent Naessens Symmetric key infrastructure for authenticated key establishment between resource constrained nodes and powerful devices Security and Communication Networks 9

Version of Record online: 24 JAN 2011 | DOI: 10.1002/sec.301

Thumbnail image of graphical abstract

Many solutions use a purely symmetric key solution to protect data exchange between lightweight devices and more powerful machines. These solutions, however, fail to fulfill the advanced requirements posed in typical RFID scenarios or scenarios where reader devices from multiple organizations (and hence with tailored privileges) require access to specific services from constrained nodes. This paper proposes a security architecture for authentication, access control and secure data transfer between resource constrained devices and powerful stations that tackles these requirements.

Complete the form below and we will send an e-mail message containing a link to the selected article on your behalf

Required = Required Field

SEARCH