Two-tier receiver-initiated secure scheme for hierarchical wireless sensor networks.
Ching-Tsung HsuehChih-Yu WenYen-Chieh OuyangPublished in: ITST (2012)
Keyphrases
- wireless sensor networks
- key management scheme
- key establishment
- identity based encryption
- key management
- provably secure
- standard model
- routing scheme
- authentication scheme
- sensor networks
- public key encryption
- security analysis
- energy consumption
- key distribution
- proxy re encryption
- base station
- secret sharing
- security model
- resource constrained
- routing protocol
- encryption key
- sensor nodes
- secure routing
- data transmission
- multi hop
- cca secure
- key exchange
- biological inspired
- privacy preserving
- authentication mechanism
- routing algorithm
- diffie hellman
- energy efficiency
- fading channels
- secret sharing scheme
- ciphertext
- mobile nodes