constrained node, constrained-node network, Internet of Things, IoT, Key management schemes, secure bootstrapping.