Handover Key Management and Re-Authentication Problem Statement.
T. Charles ClancyMadjid NakhjiriVidya NarayananLakshminath R. DondetiPublished in: RFC (2008)
Keyphrases
- key management
- key distribution
- identity based cryptography
- security services
- authentication scheme
- secure communication
- wireless sensor networks
- ad hoc networks
- encryption decryption
- resource constrained
- key management scheme
- base station
- secret sharing scheme
- group communication
- mobile networks
- provably secure
- digital signature
- secret key
- public key cryptography
- security protocols
- trusted third party
- elliptic curve
- private key
- wireless networks
- user authentication
- multimedia
- authentication protocol
- mobile ad hoc networks
- signcryption scheme
- routing algorithm
- similarity measure