Key management requirements for PTC operations.
Mark HartongRajni GoelDuminda WijesekeraPublished in: IEEE Veh. Technol. Mag. (2007)
Keyphrases
- key management
- ad hoc networks
- wireless sensor networks
- resource constrained
- key management scheme
- identity based cryptography
- key distribution
- provably secure
- security threats
- secret sharing scheme
- secure communication
- group communication
- digital signature
- security services
- secret key
- key establishment
- elliptic curve
- security protocols
- resource constraints
- wireless networks
- diffie hellman
- end to end
- sensor data