Secure and Efficient Key Management Protocol in Ad Hoc Networks.
Chuanrong ZhangYuqing ZhangPublished in: CIS (2) (2008)
Keyphrases
- key management
- provably secure
- ad hoc networks
- group key agreement
- key distribution
- key management scheme
- security protocols
- group communication
- network topology
- secret sharing scheme
- key establishment
- digital signature
- wireless ad hoc networks
- resource constrained
- security services
- wireless sensor networks
- blind signature
- quality of service
- secure routing
- end to end
- routing protocol
- peer to peer
- symmetric key
- identity based cryptography
- secure communication
- blind signature scheme
- elliptic curve
- mac protocol
- diffie hellman
- public key cryptography
- routing algorithm
- wireless networks
- real time
- multi hop
- mobile ad hoc networks
- bilinear pairings
- mobile nodes
- secret sharing
- secret key
- resource constraints
- mobile networks
- base station
- pairwise
- power consumption
- wireless mesh networks