Deployment Based Attack Resistant Key Distribution with Non Overlapping Key Pools in WSN.
Priyanka AhlawatMayank DavePublished in: Wirel. Pers. Commun. (2018)
Keyphrases
- key pre distribution
- key distribution
- secret key
- wireless sensor networks
- key management
- authentication protocol
- private key
- secure communication
- key management scheme
- sensor nodes
- group communication
- sensor networks
- key establishment
- smart card
- public key
- energy efficient
- fault tolerant
- resource constrained
- signature scheme
- key exchange
- energy consumption
- diffie hellman
- ciphertext
- elliptic curve
- fault tolerance
- rfid tags
- signcryption scheme
- routing protocol
- encryption scheme