Detecting Flaws in Dynamic Hierarchical Key Management Schemes Using Specification Animation.
Anil MundraAnish MathuriaManik Lal DasPublished in: ICDCIT (2012)
Keyphrases
- key management
- key management scheme
- provably secure
- wireless sensor networks
- ad hoc networks
- bilinear pairings
- resource constrained
- security threats
- key distribution
- secure communication
- group communication
- identity based cryptography
- secret key
- secret sharing scheme
- digital signature
- security services
- security protocols
- key establishment
- elliptic curve
- lightweight
- sensor networks
- similarity measure