Resisting Impersonation Attacks in Chaining-based Public-Key Management on Manets - The Virtual Public-key Management.
Renan Fischer e SilvaEduardo da SilvaLuiz Carlos Pessoa AlbiniPublished in: SECRYPT (2009)
Keyphrases
- key management
- ad hoc networks
- security threats
- security protocols
- key management scheme
- wireless sensor networks
- resource constrained
- key distribution
- digital signature
- secret key
- wireless ad hoc networks
- provably secure
- authentication protocol
- network topology
- security services
- smart card
- routing protocol
- secure communication
- identity based cryptography
- elliptic curve
- security mechanisms
- multi hop
- mobile ad hoc networks
- wireless networks
- fault tolerant
- energy consumption
- diffie hellman
- quality of service
- real time