A secure and efficient WSN by employing symmetric key matrix and rectangular frame scheme.
Yi-Li HuangFang-Yie LeuRuey-Kai SheuJung-Chun LiuHeru SusantoPublished in: Concurr. Comput. Pract. Exp. (2020)
Keyphrases
- symmetric key
- key management
- security analysis
- key establishment
- provably secure
- wireless sensor networks
- security requirements
- diffie hellman
- key management scheme
- security protocols
- key distribution
- public key
- public key cryptography
- sensor networks
- secure communication
- resource constrained
- secret key
- secret sharing scheme
- energy consumption
- authentication protocol
- secret sharing
- standard model
- security model
- digital signature
- ad hoc networks
- security services
- lightweight