Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks.
Hongmei DengAnindo MukherjeeDharma P. AgrawalPublished in: ITCC (1) (2004)
Keyphrases
- wireless ad hoc networks
- key management
- key distribution
- signcryption scheme
- ad hoc networks
- identity based cryptography
- security services
- secure communication
- wireless sensor networks
- resource constrained
- bilinear pairings
- security protocols
- digital signature
- provably secure
- secret sharing scheme
- private key
- public key cryptography
- end to end
- security mechanisms
- wireless networks
- routing protocol
- network topology
- authentication protocol
- routing algorithm
- multi hop
- elliptic curve
- secret key
- diffie hellman
- fault tolerant
- mobile networks
- peer to peer