2009
DOI: 10.1002/cpe.1429
|View full text |Cite
|
Sign up to set email alerts
|

A scalable key pre‐distribution mechanism for large‐scale wireless sensor networks

Abstract: SUMMARYMany applications of wireless sensor network (WSN) require secure data communications, especially in a hostile environment. In order to protect the sensitive data and the sensor readings, secret keys should be used to encrypt the exchanged messages between communicating nodes. Traditional asymmetric key cryptosystems are infeasible in WSNs due to the extremely low capacity and constrained resources at each senor node. Recently proposed protocols are either vulnerable to the large-scale node capture atta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2009
2009
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 26 publications
0
5
0
Order By: Relevance
“…The computational burden due to the key distribution phase is sustainable by sensor nodes as the process only needs to be performed once at the beginning. Detailed description of such schemes is out of the scope of our proposal, but the interested reader can find all the technical details in .…”
Section: Theoretical and Experimental Assessmentmentioning
confidence: 99%
“…The computational burden due to the key distribution phase is sustainable by sensor nodes as the process only needs to be performed once at the beginning. Detailed description of such schemes is out of the scope of our proposal, but the interested reader can find all the technical details in .…”
Section: Theoretical and Experimental Assessmentmentioning
confidence: 99%
“…The basic idea of the AP key management scheme is to preload a large number of keys in each CH while only pre-loads a small number of keys in each SN. Shen et al proposed the recent deterministic hierarchical scheme which is based on polynomial key calculations mechanism such that each network node is preloaded with a number of polynomial coefficients (g j ) [17]. A Low-Energy Key Management (LEKM) protocol is a probabilistic key management scheme proposed by Gaurave et al [18].…”
Section: Key Management Schemes Of Hierarchical Wsnsmentioning
confidence: 99%
“…To explore the advantages of our proposed key management scheme, it should be evaluated or in other words should be compared with other previous proposed schemes. In this section, we will analyze the security properties of our proposed scheme comparatively with LEAP scheme [15] which is considered the basic hierarchical key management scheme in WSNs, and with both of Kausar et al scheme [19] and Shen et al scheme [17] which are the most recent hierarchy schemes in WSNs.…”
Section: Evaluation Of Our Proposed Schemementioning
confidence: 99%
See 1 more Smart Citation
“…Wireless sensor networks (WSN) consist of a sink, a large number of randomly deployed sensor nodes for gathering local data, and a possible set of authorized users. In such a WSN, the sink may broadcast control commands to sensor nodes to facilitate normal operation of WSNs, and the authorized users could send broadcast requests to query the latest data collected by sensors [1][2][3][4][5]. However, users might be compromised and behave maliciously [6,7], and attackers might flood bogus messages to exhaust these resourceconstrained sensor nodes and then devastate the WSNs.…”
Section: Introductionmentioning
confidence: 99%