Proof-of-Concept of Network Key Management Using Lattice-Based Cryptography.
Nathan KeyaertsTeklay GebremichaelMikael GidlundPublished in: IWCMC (2022)
Keyphrases
- key management
- wireless sensor networks
- security threats
- wireless ad hoc networks
- ad hoc networks
- key management scheme
- resource constrained
- peer to peer
- network management
- computer networks
- network structure
- symmetric key
- secret key
- group communication
- secret sharing scheme
- security services
- secure communication
- sensor networks
- communication networks
- metadata
- security protocols
- end to end
- key distribution
- signcryption scheme