Keyphrases
- key management
- wireless sensor networks
- key distribution
- provably secure
- resource constrained
- security protocols
- group communication
- key management scheme
- key establishment
- elliptic curve
- ad hoc networks
- energy efficient
- security services
- secure communication
- lightweight
- sensor networks
- wireless communication
- diffie hellman
- digital signature
- sensor nodes
- secret sharing scheme
- blind signature
- identity based cryptography
- wireless ad hoc networks
- authentication protocol
- energy consumption
- secret key
- public key cryptography
- routing algorithm
- low cost
- cryptographic protocols
- security properties
- security mechanisms
- blind signature scheme
- real time
- end to end
- routing protocol
- cost effective
- signcryption scheme
- trusted third party
- resource constraints
- wifi
- wireless networks