Keyphrases
- scheme for wireless sensor networks
- key management
- key distribution
- stream cipher
- wireless sensor networks
- authentication scheme
- resource constrained
- secret key
- security mechanisms
- ad hoc networks
- security analysis
- authentication protocol
- data aggregation
- security problems
- private key
- security protocols
- security requirements
- data encryption
- authentication mechanism
- user authentication
- digital signature
- secret sharing scheme
- elliptic curve
- security issues
- image encryption
- routing protocol
- energy efficient
- wireless networks
- end to end
- smart card
- embedded systems
- software architecture
- hash functions
- biometric data
- high security
- encryption scheme