Symmetric-Key Encryption for Wireless Internet SCADA.
Rosslin John RoblesMin-Kyu ChoiPublished in: FGIT-SecTech (2009)
Keyphrases
- key management
- symmetric key
- wireless internet
- ad hoc networks
- wifi
- wireless sensor networks
- location aware
- resource constrained
- key distribution
- location based services
- digital signature
- security protocols
- secure communication
- end to end
- wireless networks
- secret key
- elliptic curve
- provably secure
- routing protocol
- mobile devices
- security services
- anomaly detection
- low cost