Security in Wireless Sensor Network and IoT: An Elliptic Curves Cryptosystem based Approach.
E. H. TeguigYoucef TouatiPublished in: UEMCON (2018)
Keyphrases
- elliptic curve
- key management
- wireless sensor networks
- scalar multiplication
- elliptic curve cryptography
- diffie hellman
- digital signature
- resource constrained
- java card
- sensor networks
- energy consumption
- public key cryptography
- key distribution
- sensor nodes
- security services
- provably secure
- secret sharing scheme
- security protocols
- ad hoc networks
- routing algorithm
- lightweight
- public key cryptosystem
- routing protocol
- modular exponentiation
- public key cryptosystems
- user authentication
- group communication
- data streams
- resource constraints
- power analysis
- end to end