Keyphrases
- security protocols
- security properties
- key management
- key distribution
- automated design
- cryptographic algorithms
- security services
- secure communication
- resource constrained
- wireless sensor networks
- ad hoc networks
- authentication protocol
- security mechanisms
- cryptographic protocols
- secret key
- security requirements
- security analysis
- artificial immune algorithm
- rfid tags