Authentication and encryption for a robotic ad hoc network using identity-based cryptography.
Jonay Suárez-ArmasCándido Caballero-GilAlexandra Rivero-GarcíaPino Caballero-GilPublished in: CoRR (2022)
Keyphrases
- identity based cryptography
- ad hoc networks
- key management
- wireless ad hoc networks
- key distribution
- digital signature
- routing protocol
- routing algorithm
- end to end
- wireless networks
- quality of service
- secret sharing scheme
- secure communication
- peer to peer
- multi hop
- real time
- provably secure
- mobile ad hoc networks
- bilinear pairings
- security protocols
- security services
- elliptic curve
- group communication
- web services
- wireless mesh networks
- mobile nodes
- diffie hellman
- resource constrained
- public key cryptography
- response time