2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07) 2007
DOI: 10.1109/mue.2007.6
|View full text |Cite
|
Sign up to set email alerts
|

A Complete Set of Protocols for Distributed Key Management in Clustered Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0
1

Year Published

2008
2008
2013
2013

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 25 publications
0
5
0
1
Order By: Relevance
“…The memory required to store keys in each type of nodes in the network is given in table 2. This table shows that the memory requirement for our scheme almost equal to [8] and very less than most of available schemes based on key pools [10] [11]. …”
Section: A Storage Requirementmentioning
confidence: 88%
See 2 more Smart Citations
“…The memory required to store keys in each type of nodes in the network is given in table 2. This table shows that the memory requirement for our scheme almost equal to [8] and very less than most of available schemes based on key pools [10] [11]. …”
Section: A Storage Requirementmentioning
confidence: 88%
“…We introduce the Elliptic Curve Digital Signature to authenticate the request messages. Our proposal partly derive from [8], which provided a set of generate and distribute of one-to-all and one-to-one communications keys in clustered network. Table 1 shows the notations in our protocol.…”
Section: Our Key Management Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…En [19], se enseñan dos protocolos donde solo trabajan con claves de grupo, claves públicas de superiores y claves de sesión con jefes de celda. Organizan la red en celdas mediante el algoritmo HEED (Hybrid, EnergyEfficient, Distributed Clustering) [20], de esta manera existe una jerarquización de los nodos.…”
Section: B Redes Heterogéneasunclassified
“…The digital signature generation and verification are included to preserve integrity and origin authentication. They use Elliptic curved based algorithm and the public keys which would have already been distributed as in our earlier work [12]. ECDSAG and ECDSAV denote the generation and verification of digital signature.…”
Section: Intrusion Confirmation Protocol Utilizing Base Stationmentioning
confidence: 99%