Keyphrases
- key establishment
- symmetric key
- security analysis
- key management
- security requirements
- secret key
- sensor networks
- security protocols
- encryption scheme
- key distribution
- wireless sensor networks
- public key cryptography
- authentication scheme
- encryption algorithm
- pairwise
- public key
- smart card
- secure communication
- security mechanisms
- data protection
- key agreement
- diffie hellman
- key management scheme
- private key
- authentication protocol
- authentication mechanism
- security model
- elliptic curve
- security services
- security properties
- information security
- resource constrained
- user authentication
- security policies
- access control
- provably secure
- secret sharing scheme
- graphical password
- sensor nodes
- security issues
- signature scheme
- pseudorandom
- low cost
- data encryption
- ad hoc networks