Identity-based Trusted Authentication in Wireless Sensor Network
Yusnani Mohd YussoffHabibah HashimMohd Dani BabaPublished in: CoRR (2012)
Keyphrases
- wireless sensor networks
- key management
- key distribution
- identity based cryptography
- authentication and key agreement
- security services
- resource constrained
- trust relationships
- secure communication
- sensor networks
- energy consumption
- authentication scheme
- energy efficient
- secret sharing scheme
- biometric authentication
- security mechanisms
- trusted platform module
- image authentication
- authentication mechanism
- signcryption scheme
- signature scheme
- public key cryptography
- resource limitations
- security protocols
- sensor nodes
- user authentication
- authentication protocol
- provably secure
- routing protocol
- secret key
- routing algorithm
- trusted computing
- private key
- ad hoc networks
- wireless sensor
- network connection
- distributed environment
- digital signature
- factor authentication
- security analysis
- lightweight