Two attacks on a sensor network key distribution scheme of Cheng and Agrawal.
Maura B. PatersonDouglas R. StinsonPublished in: J. Math. Cryptol. (2008)
Keyphrases
- key distribution
- sensor networks
- key pre distribution
- key management
- wireless sensor networks
- resource constrained
- security protocols
- key management scheme
- sensor nodes
- secret key
- key establishment
- fault tolerant
- group communication
- energy consumption
- sensor data
- communication cost
- energy efficient
- security mechanisms
- private key
- authentication protocol
- base station
- data streams
- elliptic curve
- energy efficiency
- diffie hellman
- signcryption scheme
- secure communication
- data sets
- heterogeneous sensor networks
- multi hop
- wireless ad hoc networks
- data transmission
- ad hoc networks
- cost effective
- sensing devices
- routing protocol