Secure Key Management with optimal resource allocation using multiple edge sharing multicast trees.
Joe Prathap P. MV. VasudevanPublished in: J. Convergence Inf. Technol. (2009)
Keyphrases
- key management
- ad hoc networks
- key management scheme
- key distribution
- wireless sensor networks
- resource constrained
- security protocols
- digital signature
- elliptic curve
- secure communication
- end to end delay
- identity based cryptography
- key establishment
- diffie hellman
- optimal resource allocation
- secret key
- network topology
- wireless mesh networks
- resource allocation