A Novel Identity-Based Security Scheme for Wireless Sensor Networks.
Zhongyuan QinKerong FengShuaiqi HuLei TaoZunli HuXinshuai ZhangJie HuangPublished in: CIS (2014)
Keyphrases
- scheme for wireless sensor networks
- key management
- identity based cryptography
- wireless sensor networks
- ad hoc networks
- key distribution
- resource constrained
- security protocols
- secret sharing scheme
- signcryption scheme
- stream cipher
- secret key
- provably secure
- bilinear pairings
- digital signature
- elliptic curve
- ciphertext
- data streams
- real time
- energy efficient
- computer networks
- wireless networks