2014
DOI: 10.1002/sec.1058
|View full text |Cite
|
Sign up to set email alerts
|

A dynamic key management scheme for dynamic wireless sensor networks

Abstract: Dynamic wireless sensor network (DWSN) is a group of mobile sensor nodes deployed in an intended area. Secure communication in DWSNs depends on the existence of an efficient key management scheme. Because of the movements of sensor nodes and unknown mobility pattern, dynamic key management is an important issue in such networks. In this paper, we propose a new key management scheme, which uses key pre-distribution and post-deployment key establishment mechanisms for DWSNs. The proposed approach ensures that th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(18 citation statements)
references
References 27 publications
0
18
0
Order By: Relevance
“…Mobile node reauthentication schemes for MWSNs can be classified into two types according to their encryption techniques: symmetric key cryptography schemes [9][10][11][13][14][15] and public key cryptography schemes [16][17][18][19]. Symmetric key cryptography schemes can be further classified into two types: post-deployment key establishment schemes [9][10][11]13] and hybrid schemes that use both random key pre-distribution and post-deployment key establishment mechanisms [14,15].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Mobile node reauthentication schemes for MWSNs can be classified into two types according to their encryption techniques: symmetric key cryptography schemes [9][10][11][13][14][15] and public key cryptography schemes [16][17][18][19]. Symmetric key cryptography schemes can be further classified into two types: post-deployment key establishment schemes [9][10][11]13] and hybrid schemes that use both random key pre-distribution and post-deployment key establishment mechanisms [14,15].…”
Section: Related Workmentioning
confidence: 99%
“…The previous schemes use only the post-deployment key establishment mechanism, whereas hybrid schemes [14,15] use both random key pre-distribution and postdeployment key establishment mechanisms. In these schemes, by default, two nodes authenticate each other and establish a pairwise key based on existing random key pre-distribution schemes [20,21].…”
Section: Symmetric Key Cryptography Schemesmentioning
confidence: 99%
“…Referring to the open‐ended communication environment, security is a key issue such that keeping confidentiality for messages being transferred between correspondents and establishing a shared secure session key for ensuring their subsequent communications. Authentication mechanism is an important and fundamental tool that offers only authorized users to access the mobile service and negotiates a session key between participators via an insecure channel. Naturally, many researchers devote to presenting various authenticated key agreement protocols that employ all kinds of cryptographic primitives (e.g.…”
Section: Introductionmentioning
confidence: 99%
“…Thus, obtaining cryptographic keys is an essential operation to achieve the security goals in WHMS. There are several key agreement schemes that have been proposed for WHMS applications [5,[7][8][9][10].…”
Section: Introductionmentioning
confidence: 99%