Router authentication, key management, and adjacency management for securing inter-router control messages.
Revathi Bangalore SomanathaJ. William AtwoodPublished in: Comput. Networks (2015)
Keyphrases
- key management
- key distribution
- identity management
- ad hoc networks
- security services
- identity based cryptography
- end to end
- authentication scheme
- secure communication
- wireless sensor networks
- key management scheme
- resource constrained
- digital signature
- group communication
- secret key
- encryption decryption
- elliptic curve
- secret sharing scheme
- security analysis
- signcryption scheme
- real time