Stealthy pre-attacks against random key pre-distribution security.
Panagiotis PapadimitratosJing DengPublished in: ICC (2012)
Keyphrases
- chosen plaintext
- key pre distribution
- key management
- security protocols
- wireless sensor networks
- key distribution
- security mechanisms
- key management scheme
- key establishment
- secret key
- resource constrained
- ad hoc networks
- security issues
- cryptographic protocols
- sensor networks
- access control
- secret sharing scheme
- information security
- security services
- security properties
- pairwise
- provably secure
- elliptic curve
- digital signature
- authentication protocol
- data integrity
- security analysis
- sensor nodes
- watermarking scheme
- fault tolerant