Hierarchical Approach for Key Management in Mobile Ad hoc Networks
Renuka A.K. C. ShetPublished in: CoRR (2009)
Keyphrases
- key management
- resource constrained
- ad hoc networks
- wireless sensor networks
- key management scheme
- security threats
- secure communication
- digital signature
- key distribution
- group communication
- secret sharing scheme
- provably secure
- security protocols
- security services
- mobile ad hoc networks
- secret key
- wireless ad hoc networks
- identity based cryptography
- elliptic curve
- resource constraints
- pairwise
- network topology
- wireless networks
- distributed systems