2014
DOI: 10.1155/2014/573913
|View full text |Cite
|
Sign up to set email alerts
|

A New Key Predistribution Scheme for Multiphase Sensor Networks Using a New Deployment Model

Abstract: During the lifecycle of sensor networks, making use of the existing key predistribution schemes using deployment knowledge for pairwise key establishment and authentication between nodes, a new challenge is elevated. Either the resilience against node capture attacks or the global connectivity will significantly decrease with time. In this paper, a new deployment model is developed for multiphase deployment sensor networks, and then a new key management scheme is further proposed. Compared with the existing sc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 26 publications
0
8
0
Order By: Relevance
“…In addition, in WSNs, existing researches show that schemes based on deployment knowledge can significantly improve the security performance of the entire network [16]- [20]. In these schemes, the entire network is divided into multiple cells, each cell has a local key pool, and only these local key pools of adjacent cells share some common keys.…”
Section: A Motivationmentioning
confidence: 99%
See 2 more Smart Citations
“…In addition, in WSNs, existing researches show that schemes based on deployment knowledge can significantly improve the security performance of the entire network [16]- [20]. In these schemes, the entire network is divided into multiple cells, each cell has a local key pool, and only these local key pools of adjacent cells share some common keys.…”
Section: A Motivationmentioning
confidence: 99%
“…However, local connectivity of the scheme ESPK decreases with the increase of the number of the deployment phase. The above deficiency is improved by the scheme proposed in [20]. For applications with large deployment errors, Zhou et al [21] proposed a layer model.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The symmetric key approach is an appropriate cryptography for wireless sensors due to its low energy consumption and simple hardware requirements, but the distribution of symmetric keys into sensor nodes presents a significant challenge [5]. Many researchers [6][7][8][9][10][11] have focused on this area recently and proposed several key management schemes to establish the session key between sensor nodes. However, these schemes [6][7][8][9][10][11] do not support mobile users directly accessing cluster node data via mobile device.…”
Section: Introductionmentioning
confidence: 99%
“…Many researchers [6][7][8][9][10][11] have focused on this area recently and proposed several key management schemes to establish the session key between sensor nodes. However, these schemes [6][7][8][9][10][11] do not support mobile users directly accessing cluster node data via mobile device. For example, 2 Journal of Sensors the administrators of farms or nuclear power plants can use mobile devices to gain access to the monitor data at any time from any place, rather than logging into the monitor system.…”
Section: Introductionmentioning
confidence: 99%