Anonymous and provably secure authentication protocol using self-certified cryptography for wireless sensor networks.
Yulei ChenJianhua ChenPublished in: Multim. Tools Appl. (2021)
Keyphrases
- authentication protocol
- provably secure
- wireless sensor networks
- public key cryptography
- key management
- public key
- security protocols
- hash functions
- security model
- secret key
- lightweight
- cryptographic protocols
- security analysis
- resource constrained
- energy consumption
- digital signature
- sensor networks
- key distribution
- security services
- signature scheme
- diffie hellman
- secure communication
- security properties
- smart card
- sensor nodes
- group communication
- secret sharing scheme
- rfid tags
- private key
- routing protocol
- elliptic curve
- standard model
- information systems
- high dimensional
- low cost
- peer to peer
- similarity search
- computer networks
- information security
- data streams
- web services