EASS: Encryption and Authentication Based Security Scheme to Prevent Power Exhausting Attacks in Wireless Sensor Networks.
K. MuthumanickamS. ElangoP. C. Senthil MaheshP. VijayalakshmiPublished in: Ad Hoc Sens. Wirel. Networks (2019)
Keyphrases
- symmetric key
- key management
- wireless sensor networks
- security protocols
- key distribution
- security mechanisms
- key establishment
- elliptic curve cryptography
- identity based cryptography
- cryptographic algorithms
- security analysis
- resource constrained
- public key cryptography
- authentication scheme
- private key
- authentication protocol
- public key
- security services
- encryption decryption
- authentication mechanism
- secure communication
- mutual authentication
- digital signature
- secret sharing scheme
- secret key
- data encryption
- security properties
- stream cipher
- security requirements
- cryptographic protocols
- security issues
- elliptic curve
- smart card
- high security
- digital watermark
- provably secure
- key exchange
- sensor networks
- virtual private network
- key agreement
- secure routing
- public key infrastructure
- image encryption
- access control
- integrity verification
- ad hoc networks
- advanced encryption standard
- encryption scheme
- user authentication
- identity authentication
- routing protocol
- chosen plaintext
- image authentication
- encryption algorithm
- security model
- power consumption
- encryption algorithms
- biometric template
- diffie hellman
- security vulnerabilities
- protection scheme
- information security
- key agreement protocol
- energy consumption
- rfid tags
- signcryption scheme
- sql injection
- signature scheme