Comments on an ID-Based Authenticated Group Key Agreement Protocol with Withstanding Insider Attacks.
Tsu-Yang WuYuh-Min TsengPublished in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2009)
Keyphrases
- group key agreement
- key management
- key distribution
- insider attacks
- ad hoc networks
- group communication
- provably secure
- key agreement protocol
- resource constrained
- wireless sensor networks
- attack detection
- key establishment
- diffie hellman
- cryptographic protocols
- digital signature
- secret key
- early detection
- elliptic curve
- security protocols
- secure communication
- security services
- insider threat
- quality of service
- smart card
- end to end
- routing protocol
- multistage
- protocol stack
- energy consumption
- low cost