Public key cryptography: Feasible for security in modern personal area sensor networks?
Roy FisherMengxuan LyuBo ChengGerhard P. HanckePublished in: ICIT (2016)
Keyphrases
- sensor networks
- public key cryptography
- public key
- security services
- public key infrastructure
- elliptic curve
- resource constrained
- key management
- security model
- wireless sensor networks
- digital signature
- security mechanisms
- provably secure
- personal information
- data collection
- sensor data
- sensor nodes
- symmetric key
- energy consumption
- key establishment
- data streams
- authentication protocol
- security analysis
- heterogeneous sensor networks
- security protocols
- encryption scheme
- signature scheme
- routing protocol
- access control
- private key
- database systems