Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks.
Jaewoo ChoiJihyun BangLeeHyung KimMirim AhnTaekyoung KwonPublished in: IEEE Syst. J. (2017)
Keyphrases
- key management
- wireless sensor networks
- security threats
- security services
- resource constrained
- key management scheme
- key pre distribution
- sensor networks
- insider threat
- sensor nodes
- energy consumption
- key distribution
- digital signature
- provably secure
- base station
- elliptic curve
- ad hoc networks
- security protocols
- multi hop
- routing algorithm
- data collection
- wireless ad hoc networks
- identity based cryptography
- routing protocol
- secret key
- lightweight
- end to end