2010
DOI: 10.4236/wsn.2010.29083
|View full text |Cite
|
Sign up to set email alerts
|

An Adaptive Key Management Framework for the Wireless Mesh and Sensor Networks

et al.

Abstract: Wireless sensor networks (WSNs) and wireless mesh networks (WMNs) are popular research subjects. The interconnection of both network types enables next-generation applications and creates new optimization opportunities. Currently, plenty of protocols are available on the security of either wireless sensor networks or wireless mesh networks, an investigation in peer work underpins the fact that neither of these protocols is adapt to the interconnection of these network types. The internal cause relies on the fa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 25 publications
0
1
0
Order By: Relevance
“…Protocols are also designed for authentication of packets and nodes, and confidentiality for important packets in the network. Other works like [17], [18], [19] propose ideas for key management in hierarchical sensor networks emphasizing on aspects like key updation and revocation, energy efficiency, and mitigating attacks like guessing attacks, replay attacks, man-in-the-middle and denial of service attacks. Unfortunately, the downsides of such works are in the complexity in key pre-distribution and subsequent pairwise key set-up, which increases overhead.…”
Section: A Rkp Based Schemesmentioning
confidence: 99%
“…Protocols are also designed for authentication of packets and nodes, and confidentiality for important packets in the network. Other works like [17], [18], [19] propose ideas for key management in hierarchical sensor networks emphasizing on aspects like key updation and revocation, energy efficiency, and mitigating attacks like guessing attacks, replay attacks, man-in-the-middle and denial of service attacks. Unfortunately, the downsides of such works are in the complexity in key pre-distribution and subsequent pairwise key set-up, which increases overhead.…”
Section: A Rkp Based Schemesmentioning
confidence: 99%