Security issues in privacy and key management protocols of IEEE 802.16.
Sen XuManton M. MatthewsChin-Tser HuangPublished in: ACM Southeast Regional Conference (2006)
Keyphrases
- security issues
- key management
- key distribution
- security protocols
- security mechanisms
- security threats
- security services
- key establishment
- information security
- ad hoc networks
- wireless sensor networks
- resource constrained
- cloud computing
- enterprise network
- key management scheme
- digital signature
- provably secure
- elliptic curve
- rfid tags
- security properties
- secret key
- authentication protocol
- secure communication
- smart grid
- database
- cryptographic protocols
- sensor networks
- data security
- end to end