Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Hierarchical secure key assignment scheme

Fig 5

Workflow diagram for the proposed hierarchical key assignment scheme.

Steps 1a and 1b are grouped under the System-Ready Phase, followed by key derivation and dynamic rekeying with compromise detection.

Fig 5

doi: https://doi.org/10.1371/journal.pone.0341637.g005