Jan Vossaert, Jorn Lapon, Bart De Decker and Vincent Naessens Symmetric key infrastructure for authenticated key establishment between resource constrained nodes and powerful devices Security and Communication Networks 9
Many solutions use a purely symmetric key solution to protect data exchange between lightweight devices and more powerful machines. These solutions, however, fail to fulfill the advanced requirements posed in typical RFID scenarios or scenarios where reader devices from multiple organizations (and hence with tailored privileges) require access to specific services from constrained nodes. This paper proposes a security architecture for authentication, access control and secure data transfer between resource constrained devices and powerful stations that tackles these requirements.
Complete the form below and we will send an e-mail message containing a link to the selected article on your behalf