Secure Key Management Architecture Against Sensor-Node Fabrication Attacks.
Jeffrey S. DwoskinDahai XuJianwei HuangMung ChiangRuby B. LeePublished in: GLOBECOM (2007)
Keyphrases
- key management
- wireless sensor networks
- sensor nodes
- security threats
- security protocols
- resource constrained
- key management scheme
- sensor networks
- key distribution
- security mechanisms
- energy consumption
- key establishment
- ad hoc networks
- routing protocol
- security services
- data collection
- digital signature
- secret sharing scheme
- symmetric key
- base station
- provably secure
- secure communication
- key pre distribution
- elliptic curve
- group communication
- routing algorithm
- multi hop
- lightweight
- identity based cryptography
- wireless ad hoc networks
- authentication protocol
- diffie hellman
- data sets
- sensor data