Protecting from Attacking the Man-in-Middle in Wireless Sensor Networks with Elliptic Curve Cryptography Key Exchange.
Xu HuangPritam Gajkumar ShahDharmendra SharmaPublished in: NSS (2010)
Keyphrases
- elliptic curve cryptography
- key exchange
- security analysis
- wireless sensor networks
- diffie hellman
- elliptic curve
- public key
- key management
- smart card
- security requirements
- digital signature
- information security
- sensor networks
- energy consumption
- resource constrained
- sensor nodes
- access control
- security properties
- routing algorithm
- routing protocol
- encryption scheme
- lightweight
- secure communication
- efficient computation
- key distribution