A scheme for key distribution in wireless sensor network based on Hierarchical Identity-Based Encryption.
Yan LiuXiumei WuXuemin ChenPublished in: ICNSC (2015)
Keyphrases
- key distribution
- identity based encryption
- key management
- provably secure
- secret key
- wireless sensor
- wireless sensor networks
- standard model
- public key
- signature scheme
- private key
- diffie hellman
- group communication
- encryption scheme
- ciphertext
- authentication protocol
- sensor networks
- proxy re encryption
- resource constrained
- security model
- fault tolerant
- ad hoc networks
- digital signature
- secure communication
- cca secure
- smart card
- energy efficiency
- fault tolerance
- elliptic curve
- security protocols
- energy consumption
- security analysis
- network management
- hash functions
- network security
- wireless communication
- sensor nodes