Security weakness in an authenticated group key agreement protocol in two rounds.
Jung Yeon HwangKyu Young ChoiDong Hoon LeePublished in: Comput. Commun. (2008)
Keyphrases
- group key agreement
- key management
- key distribution
- ad hoc networks
- key establishment
- key exchange protocol
- key agreement protocol
- wireless sensor networks
- resource constrained
- authentication scheme
- group communication
- sensor networks
- diffie hellman
- secret key
- provably secure
- digital signature
- security services
- end to end
- key exchange
- secret sharing scheme
- security protocols
- pairwise
- elliptic curve
- secure communication
- private key
- routing protocol
- wireless networks
- symmetric key
- digital libraries
- low cost
- sensor nodes
- fault tolerant
- cryptographic protocols
- similarity measure