< Back to Article
Hierarchical secure key assignment scheme
Fig 5
Workflow diagram for the proposed hierarchical key assignment scheme.
Steps 1a and 1b are grouped under the System-Ready Phase, followed by key derivation and dynamic rekeying with compromise detection.
doi: https://doi.org/10.1371/journal.pone.0341637.g005