A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks.
Shimaa A. Abdel HakeemSherine M. Abd El-KaderHyungWon KimPublished in: Sensors (2021)
Keyphrases
- key management
- key distribution
- provably secure
- security protocols
- group communication
- ad hoc networks
- wireless ad hoc networks
- elliptic curve
- key management scheme
- key establishment
- resource constrained
- wireless sensor networks
- security services
- secure communication
- hash functions
- diffie hellman
- mobile nodes
- identity based cryptography
- secret key
- digital signature
- secret sharing scheme
- security properties
- authentication protocol
- computer networks
- sensor networks
- cryptographic protocols
- standard model
- wireless networks
- security model
- mobile ad hoc networks
- routing protocol
- blind signature
- lightweight