Security analysis of existing IoT key management protocols | IEEE Conference Publication | IEEE Xplore