Multicast Key Management without Rekeying Processes.
Iuon-Chang LinShih-Shan TangChung-Ming WangPublished in: Comput. J. (2010)
Keyphrases
- key management scheme
- key management
- wireless sensor networks
- ad hoc networks
- resource constrained
- key distribution
- mobile ad hoc networks
- security threats
- secret sharing scheme
- security services
- security protocols
- digital signature
- group communication
- wireless ad hoc networks
- provably secure
- secret key
- data sets
- diffie hellman
- secure communication
- high dimensional
- network topology
- routing algorithm
- real time
- temporal reasoning
- low cost
- fault tolerant
- wireless networks