2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT) 2013
DOI: 10.1109/icccnt.2013.6726618
|View full text |Cite
|
Sign up to set email alerts
|

Active key management scheme to avoid clone attack in wireless sensor network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…T. Shivaiah et al [11] [12] anticipate a nominal three-tier security architecture for pair-wise key establishment and authentication among mobile sinks and sensor nodes. Based on polynomial pool-based key pre-distribution strategy network resilience is contrasted with polynomial pool-based key pre-distribution method.…”
Section: Related Workmentioning
confidence: 99%
“…T. Shivaiah et al [11] [12] anticipate a nominal three-tier security architecture for pair-wise key establishment and authentication among mobile sinks and sensor nodes. Based on polynomial pool-based key pre-distribution strategy network resilience is contrasted with polynomial pool-based key pre-distribution method.…”
Section: Related Workmentioning
confidence: 99%
“…At the hospital, doctors can check the health status of the infant by using wireless medical sensor networks. Body temperatures, blood pressure, heartbeat, pulse rate and sugar level are the important parameters used to check the health status of the infant [16]. In recent days, researchers working towards to develop the wireless sensor network based health monitoring system.…”
Section: Related Workmentioning
confidence: 99%