Implicit authentication protocol and self-healing key management for WBANs.
Jian ShenShaohua ChangQi LiuJun ShenYongjun RenPublished in: Multim. Tools Appl. (2018)
Keyphrases
- key management
- resource constrained
- authentication protocol
- security protocols
- rfid tags
- wireless sensor networks
- sensor networks
- resource constraints
- key distribution
- security services
- security mechanisms
- secret key
- digital signature
- smart card
- lightweight
- key management scheme
- secret sharing scheme
- authentication scheme
- secure communication
- low cost
- security analysis
- public key
- multipath
- elliptic curve
- software systems
- group communication
- embedded systems
- shortest path
- power consumption