Login / Signup
Dual Trust Secure protocol for cluster-based wireless sensor networks.
Li Yang
Melody Moh
Published in:
ACSCC (2011)
Keyphrases
</>
wireless sensor networks
secure routing
key establishment
key management
security services
cryptographic protocols
biological inspired
key distribution
covert channel
security protocols
lightweight
routing protocol
sensor networks
key management scheme
residual energy
authentication protocol
provably secure
group communication
routing scheme
scalar product
ad hoc networks
trust model
energy efficient
mac protocol
malicious nodes
data dissemination
energy efficiency
electronic transactions
security analysis
key exchange protocol
homomorphic encryption
energy consumption
trust evaluation
key agreement protocol
resource constrained
multi hop
base station
trusted computing
multi party
security properties
privacy preserving
trust relationships
sensor nodes
wireless communication
routing algorithm
digital signature
key exchange
secure multi party
secure communication
diffie hellman
trusted third party
trust negotiation
secret key
electronic voting
security requirements
node selection
public key infrastructure
electronic commerce
cloud computing