Post Deployment Encryption Key Generation for a Fully Connected and Secure Wireless Sensor Network.
Saif-Ur RehmanGang CuiJianmin BaoPublished in: DASC (2014)
Keyphrases
- fully connected
- key management
- wireless sensor networks
- key exchange
- encryption scheme
- digital signature
- resource constrained
- key distribution
- sensor networks
- key establishment
- security properties
- data encryption
- conditional random fields
- cryptographic protocols
- security protocols
- scale free
- routing protocol
- diffie hellman
- elliptic curve
- security analysis
- public key cryptography
- advanced encryption standard
- ad hoc networks
- security requirements
- private key
- ciphertext
- encryption algorithm
- standard model