Scalable Authentication and Key Management in SCADA.
Liangliang XiaoI-Ling YenFarokh B. BastaniPublished in: ICPADS (2010)
Keyphrases
- key management
- key distribution
- symmetric key
- identity based cryptography
- security services
- secure communication
- resource constrained
- ad hoc networks
- wireless sensor networks
- authentication scheme
- encryption decryption
- key management scheme
- group communication
- digital signature
- secret key
- security protocols
- secret sharing scheme
- security mechanisms
- provably secure
- private key
- elliptic curve
- diffie hellman
- public key cryptography
- key establishment
- authentication protocol
- routing protocol
- intrusion detection
- lightweight
- signcryption scheme
- response time
- end to end
- metadata