Identity-based secure protocol scheme for wireless sensor network.
Sang-Ho NaKyu-Jin KimMohammad Mehedi HassanEui-nam HuhPublished in: ICIS (2009)
Keyphrases
- key distribution
- key management
- wireless sensor networks
- provably secure
- key establishment
- key management scheme
- signature scheme
- group communication
- diffie hellman
- blind signature
- secret sharing scheme
- authentication protocol
- secret key
- standard model
- security protocols
- secure communication
- private key
- key agreement protocol
- elliptic curve
- sensor networks
- encryption scheme
- fault tolerant
- resource constrained
- bilinear pairings
- key agreement
- public key
- electronic voting
- signcryption scheme
- ad hoc networks
- digital signature scheme
- security model
- identity based signature
- digital signature
- cryptographic protocols
- blind signature scheme
- identity based cryptography
- energy consumption
- sensor nodes
- key exchange
- public key cryptography
- smart card
- identity based encryption
- authentication scheme
- session key
- secret sharing
- lightweight
- security services
- data transmission
- routing scheme
- hash functions
- authentication and key agreement
- secure multi party
- energy efficiency
- proxy re encryption
- mutual authentication
- forward secure
- wireless networks
- routing algorithm
- energy efficient
- trusted third party