Secure Collection Tree Protocol for Tamper-Resistant Wireless Sensors.
Peter PechoJan NagyPetr HanácekMartin DrahanskýPublished in: FGIT-SecTech (2009)
Keyphrases
- wireless sensor
- cryptographic protocols
- covert channel
- security protocols
- authentication protocol
- scalar product
- lightweight
- security analysis
- key distribution
- provably secure
- key exchange protocol
- secure routing
- diffie hellman
- key agreement protocol
- base station
- homomorphic encryption
- wireless sensor networks
- rfid systems
- key management
- privacy preserving
- sensor networks
- security requirements
- fault tolerance
- public key
- rfid tags
- fault tolerant
- real time
- signature scheme
- network management
- wireless communication
- smart card
- data mining