The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols.
Kim-Kwang Raymond ChooColin BoydYvonne HitchcockPublished in: Comput. Commun. (2006)
Keyphrases
- key establishment
- formal analysis
- sensor networks
- wireless sensor networks
- pairwise
- key management
- secret key
- key establishment protocol
- security protocols
- key distribution
- ban logic
- cryptographic protocols
- symmetric key
- data streams
- formal methods
- information security
- resource constrained
- smart card
- sensor nodes
- authentication protocol
- similarity measure