An end-to-end secure key management protocol for e-health applications.
Mohammed Riyadh AbdmeziemDjamel TandjaouiPublished in: Comput. Electr. Eng. (2015)
Keyphrases
- end to end
- key management
- ad hoc networks
- key distribution
- provably secure
- security protocols
- group communication
- key management scheme
- key establishment
- security services
- network topology
- wireless ad hoc networks
- secure communication
- elliptic curve
- internet protocol
- diffie hellman
- digital signature
- routing algorithm
- transport layer
- mobile nodes
- application layer
- resource constrained
- wireless sensor networks
- multi hop
- multipath
- congestion control
- cryptographic protocols
- blind signature
- identity based cryptography
- base station
- authentication protocol
- mobile ad hoc networks
- transport protocol
- trusted third party
- wireless mesh networks
- private key
- security properties
- public key cryptography
- mobile networks
- lightweight