2013 IEEE/CIC International Conference on Communications in China (ICCC) 2013
DOI: 10.1109/iccchina.2013.6671199
|View full text |Cite
|
Sign up to set email alerts
|

A logic-route key tree based group key management scheme for wireless sensor networks

Abstract: Energy efficiency is one of the most essential design considerations because of sensor node's resource constraints in wireless sensor networks (WSNs). Group communication is an important technique to reduce WSNs communication overhead. As an imperative group key management, the logical key treebased scheme can reduce the number of rekeying messages to O(logiV) by building a tree of key encryption keys (KEKs). Unfortunately, it can incur heavy overhead for key update whenever the group member changes. In this p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 13 publications
0
5
0
Order By: Relevance
“…To decrease the number of needed rekeying messages, logical key tree was applied into key distribution schemes. Jiang et al proposed a group key management scheme which was based on logic route key [29]. The proposed scheme divides a WSN into clusters and generates a route key tree based on the route topology of the WSN.…”
Section: B Self-healing Methodsmentioning
confidence: 99%
“…To decrease the number of needed rekeying messages, logical key tree was applied into key distribution schemes. Jiang et al proposed a group key management scheme which was based on logic route key [29]. The proposed scheme divides a WSN into clusters and generates a route key tree based on the route topology of the WSN.…”
Section: B Self-healing Methodsmentioning
confidence: 99%
“…Jiang et al 12 analyzed scalable and secure GKM scheme based on hierarchal cluster (HRKT) that is used for dividing the group key into cluster-key and cluster-head-key. The route-key structure and logic-tree are important reasons to run this proposed scheme.…”
Section: Related Workmentioning
confidence: 99%
“…Since wireless sensor networks are cheap and easy to implement [56] , they are popular to assist detecting energy theft. McLaughlin et al proposed an AMI Intrusion Detection System (AMIDS) that uses information fusion to combine the sensors and consumption data from a smart meter to more accurately detect energy theft [38,39] .…”
Section: State-based Detection Techniquementioning
confidence: 99%