A low-resource public-key identification scheme for RFID tags and sensor nodes.
Yossef OrenMartin FeldhoferPublished in: WISEC (2009)
Keyphrases
- public key
- rfid tags
- resource constrained
- sensor nodes
- wireless sensor networks
- authentication protocol
- security analysis
- sensor networks
- private key
- authentication scheme
- security model
- public key cryptography
- diffie hellman
- provably secure
- low cost
- secure communication
- digital signature
- lightweight
- base station
- energy consumption
- secret key
- key management
- signature scheme
- security mechanisms
- encryption scheme
- resource constraints
- key distribution
- cost effective
- symmetric key
- sensor data
- wireless communication
- power consumption
- secret sharing scheme
- multi hop
- security issues
- standard model
- routing algorithm
- ciphertext
- wireless networks
- trusted third party