Securing wireless sensor networks: an identity-based cryptography approach.
Piotr SzczechowiakMichael ScottMartin CollierPublished in: Int. J. Sens. Networks (2010)
Keyphrases
- identity based cryptography
- wireless sensor networks
- key management
- resource constrained
- sensor networks
- energy consumption
- digital signature
- secret sharing scheme
- sensor nodes
- secure communication
- routing algorithm
- multi hop
- ad hoc networks
- group communication
- provably secure
- key distribution
- wireless ad hoc networks
- bilinear pairings
- information security
- routing protocol
- lightweight
- real time
- elliptic curve
- security protocols
- diffie hellman