Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption.
Shu Yun LimChuan Chin PuHyotaek LimHoon-Jae LeePublished in: IACR Cryptol. ePrint Arch. (2007)
Keyphrases
- wireless sensor networks
- key exchange
- key management
- key distribution
- sensor networks
- energy efficient
- energy consumption
- authentication scheme
- key exchange protocol
- sensor nodes
- resource constrained
- diffie hellman
- environmental monitoring
- security analysis
- information security
- multi hop
- data transmission
- energy efficiency
- key agreement protocol
- data aggregation
- data gathering
- topology control
- secret key
- base station
- wireless communication
- routing protocol
- encryption algorithms
- digital signature
- image encryption
- secure communication
- routing algorithm
- group communication
- private key
- provably secure
- data protection
- security properties
- sensor data
- biological inspired