Trust threshold based public key management in mobile ad hoc networks.
Jin-Hee ChoIng-Ray ChenKevin S. ChanPublished in: Ad Hoc Networks (2016)
Keyphrases
- key management
- security services
- wireless sensor networks
- resource constrained
- ad hoc networks
- key management scheme
- security protocols
- security threats
- secret key
- key distribution
- identity based cryptography
- secure communication
- digital signature
- wireless ad hoc networks
- provably secure
- secret sharing scheme
- elliptic curve
- diffie hellman
- mobile ad hoc networks
- web services
- shortest path
- similarity measure