One of the key problems with symmetric encryption is mammoth key generation and distribution problem. How is AES encryption algorithm key exchanged between sensor nodes in Contiki in the presence of a third party man in the middle attacker?

More Faisal A. Garba's questions See All
Similar questions and discussions