Shared Security: How Wireless Sensor Networks Can Benefit from Threshold Cryptography.
Manuel KoschuchMatthias HudlerMichael KrügerPeter LoryJürgen WenzlPublished in: ICETE (Selected Papers) (2011)
Keyphrases
- wireless sensor networks
- information security
- key management
- encryption algorithms
- wireless sensor
- sensor networks
- public key cryptography
- security issues
- cellular automata
- elliptic curve cryptography
- resource constrained
- energy efficient
- security requirements
- intrusion detection
- security policies
- sensor nodes
- provably secure
- data aggregation
- access control
- energy efficiency
- security mechanisms
- security analysis
- key management scheme
- wireless sensor nodes
- energy consumption
- wireless communication
- smart card
- security systems
- routing algorithm
- cryptographic protocols
- secure routing
- topology control
- signcryption scheme
- malicious nodes
- biological inspired
- key establishment
- security level
- environmental monitoring
- security model
- security protocols
- multi hop
- routing protocol
- base station
- threshold selection
- biometric systems
- network security