2013
DOI: 10.1186/1687-1499-2013-145
|View full text |Cite
|
Sign up to set email alerts
|

A new key predistribution scheme for general and grid-group deployment of wireless sensor networks

Abstract: Key predistribution for wireless sensor networks has been a challenging field of research because stringent resource constraints make the key predistribution schemes difficult to implement. Despite this, key predistribution scheme is regarded as the best option for key management in wireless sensor networks. Here, the authors have proposed a new key predistribution scheme. This scheme exhibits better performance than existing schemes of its kind. Moreover, our scheme ensures constant time of key establishment … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
26
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(26 citation statements)
references
References 32 publications
0
26
0
Order By: Relevance
“…The work devises a protocol in the lines of an earlier works that perform efficiently with only one CH per cluster thereby establishes that 3 “agents” per cluster is a luxurious requirement of . More recent works imitate similar tricks as the literature (without due reference to these earlier works) while proposing their respective schemes. These schemes perform equally efficiently with only 1 “supernode” per cluster.…”
Section: Related Workmentioning
confidence: 93%
See 2 more Smart Citations
“…The work devises a protocol in the lines of an earlier works that perform efficiently with only one CH per cluster thereby establishes that 3 “agents” per cluster is a luxurious requirement of . More recent works imitate similar tricks as the literature (without due reference to these earlier works) while proposing their respective schemes. These schemes perform equally efficiently with only 1 “supernode” per cluster.…”
Section: Related Workmentioning
confidence: 93%
“…For instance, a desired property of a randomized scheme may occur only with a certain probability whereas they can be proven to hold in a deterministic scheme (refer to the literature). This led to proposals of numerous deterministic KPS etc using various combinatorial tricks. Certain KPS exploit special structures like unique factorization domain (UFD).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Hybrid approaches have also been proposed for WSN. In hybrid approaches, both symmetric and asymmetric keys are used [15]. Public key cryptography is not viable to use in those sensor networks, which have large number of nodes.…”
Section: Public Key Cryptography In Wsnmentioning
confidence: 99%
“…The attained results demonstrate that their approach improves significantly the network scalability even as providing high secure connectivity expositing and good generally presentations. Bag and Roy [15] have presented a key predistribution method in a grid-group exploitation of sensor nodes. The method makes sure that there will be high probability of survival of an ordinary unexposed link between two nodes belonging to two dissimilar groups yet if a substantial number of nodes are cooperation's by the opponent.…”
Section: Introductionmentioning
confidence: 99%