A Novel Secure Session Key Generation using two-level architecture For Cluster-Based Ad Hoc Networks Based On ID-Based Bilinear Paring.
Jue-Sam ChouYalin ChenTsung-Heng ChenPublished in: IACR Cryptol. ePrint Arch. (2007)
Keyphrases
- ad hoc networks
- key management
- key distribution
- group key agreement
- routing protocol
- key management scheme
- network topology
- wireless ad hoc networks
- secure communication
- end to end
- secure routing
- wireless networks
- provably secure
- routing algorithm
- quality of service
- network infrastructure
- diffie hellman
- mobile wireless
- bilinear pairings
- mobile ad hoc networks
- multi hop
- wireless sensor networks
- signcryption scheme
- peer to peer
- security services
- security protocols
- digital signature
- mac protocol
- key establishment
- real time
- end to end delay
- software architecture
- blind signature
- network architecture
- resource constrained
- group communication
- wireless mesh networks
- blind signature scheme
- response time
- application level
- network nodes
- mobile networks
- fault tolerant
- secret sharing
- service differentiation
- encryption scheme
- mobile nodes