Reply to Comments on "Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks".
Maria AzeesPublished in: IEEE Trans. Intell. Transp. Syst. (2019)
Keyphrases
- key management
- data transmission
- vehicular ad hoc networks
- routing protocol
- ad hoc networks
- key distribution
- wireless sensor networks
- security services
- data delivery
- secure communication
- identity based cryptography
- network topology
- key management scheme
- routing algorithm
- sensor networks
- energy consumption
- sensor nodes
- digital signature
- mobile ad hoc networks
- resource constrained
- base station
- multi hop
- energy efficient
- security protocols
- data transfer
- public key cryptography
- energy efficiency
- provably secure
- mobile networks
- elliptic curve
- diffie hellman
- authentication protocol
- mobile nodes
- data collection
- computer networks
- wireless communication
- security analysis