Authentication and ID-Based Key Management Protocol in Pervasive Environment.
Jong Sik MoonJong Hyuk ParkDeok-Gyu LeeIm-Yeong LeePublished in: Wirel. Pers. Commun. (2010)
Keyphrases
- key distribution
- key management
- pervasive environments
- provably secure
- symmetric key
- group communication
- ad hoc networks
- resource constrained
- pervasive computing
- security protocols
- security services
- key management scheme
- wireless sensor networks
- secret key
- key agreement protocol
- digital signature
- signcryption scheme
- secret sharing scheme
- elliptic curve
- bilinear pairings
- secure communication
- authentication protocol
- public key cryptography
- key establishment
- identity based cryptography
- diffie hellman
- private key
- key agreement
- mobile devices
- authentication scheme
- service discovery
- blind signature
- routing algorithm
- fault tolerant
- end to end
- ambient intelligence
- metadata