Authentication and key management for Advanced Metering Infrastructures utilizing physically unclonable functions.
Mohamed NabeelSam KerrXiaoyu DingElisa BertinoPublished in: SmartGridComm (2012)
Keyphrases
- key management
- key distribution
- identity based cryptography
- security services
- secure communication
- ad hoc networks
- resource constrained
- authentication scheme
- encryption decryption
- wireless sensor networks
- secret key
- key management scheme
- elliptic curve
- provably secure
- public key cryptography
- group communication
- digital signature
- security protocols
- security mechanisms
- secret sharing scheme
- fault tolerant
- bilinear pairings
- end to end