Authentication and Encryption for a Robotic Ad Hoc Network Using Identity-Based Cryptography.
Jonay Suárez-ArmasCándido Caballero-GilAlexandra Rivero-GarcíaPino Caballero-GilPublished in: Innovate-Data (2018)
Keyphrases
- identity based cryptography
- ad hoc networks
- key management
- key distribution
- digital signature
- wireless ad hoc networks
- end to end
- routing algorithm
- wireless networks
- routing protocol
- secret sharing scheme
- quality of service
- security services
- provably secure
- secure communication
- mobile ad hoc networks
- real time
- group communication
- multi hop
- bilinear pairings
- peer to peer
- wireless mesh networks
- private key
- security protocols
- elliptic curve
- resource constrained
- public key cryptography
- secret key
- response time