2008
DOI: 10.1002/sec.89
|View full text |Cite
|
Sign up to set email alerts
|

An efficient scheme for removing compromised sensor nodes from wireless sensor networks

Abstract: SummaryThe goal of key management is to establish the required keys between sensor nodes which exchange data. A key management protocol includes two aspects: key distribution and key revocation. Key distribution has been extensively studied in the context of sensor networks. However, key revocation has received relatively little attention. In this paper, we first review and summarize the current key revocation schemes for sensor networks. Then, we present an efficient scheme, KeyRev, for removing compromised s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…NS2 simulator also allows us to understand the working of a particular algorithm in terms of showing the steps in a basic visual format. We have compared our algorithm's performance with regard to that of an algorithm called Resist 1 [7] on the basis of: (a) residual energy (b) receive ratio.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…NS2 simulator also allows us to understand the working of a particular algorithm in terms of showing the steps in a basic visual format. We have compared our algorithm's performance with regard to that of an algorithm called Resist 1 [7] on the basis of: (a) residual energy (b) receive ratio.…”
Section: Resultsmentioning
confidence: 99%
“…IoannisKrontiris et al [6] have described their study of an efficient way to recognize a sinkhole attack with MintRoute as the underlying protocol. Anthonis Papadimitriou et al [7] have proposed a method of forming resilience against possible sinkhole attacks, that is, the concept of prevention. However, there has been relatively less work in the domain of intrusion detection in WSNs routed using CTP.…”
Section: Related Workmentioning
confidence: 99%
“…Each of these components has its custom attack points and should be secured in an appropriate way. Individual sensor nodes in a WSN are inherently resource constrained [113]. This comes as a result of economic viability considerations, leading to sensor devices being limited in their power, computation, and communication capabilities.…”
Section: Attack Points In Cyber-physical Systemsmentioning
confidence: 99%
“…In most existing schemes, the revocation of a compromised node requires revoking a large number of keys [25], [29], [30], which causes serious problems in network connectivity.…”
Section: Comparisonsmentioning
confidence: 99%