A Trust Based Threshold Cryptography Key Management for Mobile Ad Hoc Networks.
Hisham DahshanJames IrvinePublished in: VTC Fall (2009)
Keyphrases
- key management
- symmetric key
- ad hoc networks
- signcryption scheme
- wireless sensor networks
- routing protocol
- resource constrained
- security threats
- key distribution
- identity based cryptography
- key management scheme
- digital signature
- secret sharing scheme
- provably secure
- elliptic curve
- secret key
- security protocols
- security services
- group communication
- secure communication
- public key cryptography
- diffie hellman
- security mechanisms
- energy consumption
- wireless networks
- low cost
- key establishment
- sensor networks