A chaos-based secure cluster protocol for wireless sensor networks.
Qian FangYing LiuXiaoqun ZhaoPublished in: Kybernetika (2008)
Keyphrases
- wireless sensor networks
- secure routing
- key establishment
- key management
- cryptographic protocols
- key distribution
- biological inspired
- lightweight
- covert channel
- key management scheme
- security protocols
- routing protocol
- authentication protocol
- data dissemination
- routing scheme
- group communication
- energy efficient
- provably secure
- scalar product
- residual energy
- sensor networks
- key exchange protocol
- security analysis
- clustering algorithm
- mac protocol
- multi party
- sensor nodes
- vertically partitioned data
- key exchange
- password authentication
- energy consumption
- ad hoc networks
- homomorphic encryption
- routing algorithm
- base station
- resource constrained
- privacy preserving
- rfid systems
- reduce the energy consumption
- mutual authentication
- key agreement protocol
- node selection
- elliptic curve
- encryption algorithm
- secure communication
- secure multiparty computation
- diffie hellman
- security requirements
- multi hop
- trusted third party
- mobile nodes
- secret key
- user privacy
- wireless communication
- image encryption
- secure multi party
- security properties