A self-organized key management scheme for ad hoc networks based on identity-based cryptography.
Mihai Lica PuraDidier BuchsPublished in: COMM (2014)
Keyphrases
- identity based cryptography
- ad hoc networks
- key management
- key management scheme
- network topology
- routing protocol
- end to end
- wireless ad hoc networks
- routing algorithm
- wireless networks
- peer to peer
- quality of service
- key distribution
- secret sharing scheme
- digital signature
- mobile ad hoc networks
- bilinear pairings
- mobile networks
- provably secure
- elliptic curve
- secure communication
- group communication
- base station
- security protocols
- security services
- multi hop
- standard model
- real time
- mobile nodes