A two-tiered authentication and encryption scheme in secure healthcare sensor networks.
Mohammed Raza KanjeeKalyani DiviHong LiuPublished in: IAS (2010)
Keyphrases
- encryption scheme
- sensor networks
- security analysis
- symmetric key
- key establishment
- public key encryption
- private key
- standard model
- diffie hellman
- public key
- wireless sensor networks
- authentication protocol
- resource constrained
- user authentication
- cca secure
- authentication scheme
- secret key
- data sharing
- security mechanisms
- ciphertext
- key management
- secret sharing scheme
- energy consumption
- data streams
- hash functions
- proxy re encryption
- encryption algorithm
- security model
- sensor nodes
- secret sharing
- secure communication
- routing protocol
- public key cryptography
- key distribution
- data sets
- provably secure
- video sequences