Using On-chip cryptographic units for security in wireless sensor networks.
Janhavi KulkarniKaran NairAditya PappuSarthak GadreGanesh GoreJonathan JoshiPublished in: MWSCAS (2017)
Keyphrases
- wireless sensor networks
- key management
- security protocols
- energy efficient
- resource constrained
- digital signature
- wireless sensor
- key distribution
- energy efficiency
- sensor networks
- security properties
- low cost
- key management scheme
- base station
- high speed
- ad hoc networks
- key establishment
- security services
- security issues
- security requirements
- sensor nodes
- encryption decryption
- data aggregation
- energy consumption
- provably secure
- random number generator
- encryption scheme
- fuzzy vault
- smart card
- network security
- routing algorithm
- high assurance
- elliptic curve cryptography
- secure communication
- public key encryption
- encryption key
- routing protocol
- information security
- stream cipher
- wireless communication
- high density
- secret key
- multi hop
- security mechanisms
- security policies
- cryptographic algorithms
- elliptic curve
- intrusion detection
- data streams