Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control.
Haodong WangBo ShengChiu C. TanQun LiPublished in: ICDCS (2008)
Keyphrases
- symmetric key
- key establishment
- public key
- sensor networks
- key management
- security analysis
- public key cryptography
- resource constrained
- security protocols
- provably secure
- wireless sensor networks
- key management scheme
- security requirements
- secret key
- security mechanisms
- encryption scheme
- diffie hellman
- security model
- digital signature
- private key
- secure communication
- signature scheme
- smart card
- key distribution
- encryption algorithm
- security services
- sensor nodes
- authentication protocol
- security properties
- data streams
- standard model
- energy consumption
- access control
- rfid tags
- information security
- cryptographic protocols