B. Key Exchange in Sensor Networks
B.1 | Introduction |
B.2 | Security Issues in a Sensor Network |
B.3 | The Basic Bootstrapping Framework |
B.4 | The Basic Random Key Predistribution Scheme |
B.5 | Random Pairwise Scheme |
B.6 | Polynomial-pool-based Key Predistribution |
B.7 | Matrix-based Key Predistribution |
B.8 | Location-aware Key Predistribution |
One of the keys to happiness is a bad memory.
—Rita Mae Brown
That theory is worthless. It isn’t even wrong!
—Wolfgang Pauli
You’re only as sick as your secrets.
—Anonymous
Get Public-key Cryptography: Theory and Practice now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.