Keyphrases
- key establishment
- symmetric key
- key management
- resource constrained
- secure communication
- security analysis
- sensor networks
- key distribution
- wireless sensor networks
- security mechanisms
- security protocols
- secret key
- security requirements
- sensor nodes
- key management scheme
- diffie hellman
- pairwise
- encryption scheme
- authentication scheme
- public key cryptography
- security services
- group communication
- authentication mechanism
- authentication protocol
- provably secure
- secret sharing scheme
- elliptic curve
- smart card
- public key
- resource constraints
- encryption algorithm
- private key
- ad hoc networks
- secret sharing
- sensor data
- key agreement
- end to end
- ciphertext
- security policies
- digital signature
- information sharing
- security properties
- wireless personal area networks