1. The nodes need to generate the public keys and private keys randomly... (1) Can use the A/D conversion of noise... 2. A number of public/private keys can be generated and will be shared with the gateway through the gateway's public key and then used for encryption and decryption. 3. Here the public keys of the nodes are kept as secrets.... (1) So no entity other than the gateway can control the node. (2) So control/command data to actuators are protected. 4. This helps in preventing eaves dropping and cracking of messages. (1) More to follow...
展开▼