2014
DOI: 10.1002/sec.1104
|View full text |Cite
|
Sign up to set email alerts
|

Application‐specific hybrid symmetric design of key pre‐distribution for wireless sensor networks

Abstract: Wireless sensor networks have been established for a wide range of applications in adversarial environments, which makes secure communication between sensor nodes a challenging issue. To achieve high level of security, each pair of nodes must share a secret key in order to communicate with each other. Because of the random deployment of sensors, a set of keys must be pre-distributed, so that each sensor node is assigned a set of keys from a key pool before the deployment. The keys stored in each node must be c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 36 publications
0
7
0
Order By: Relevance
“…Complete connectivity between network nodes was the improvement of this algorithm. Also provided is the hybrid pre-key distribution method.Chakrabarti et al [19] and Kavitha et al [20] enhanced the scalability and connectivity of the previous approach.Dargahi et al [21] enhanced the hybrid method to get the keys for almost all network nodes, but didn"t get the exact number of keys to all network nodes. When compared to prior hybrid techniques, Akhbarifar et al [22] used a hybrid strategy and provided improved connectivity and resilience.…”
Section: ) Every Line Should Be Having Exactly Q+1 Pointsmentioning
confidence: 99%
See 1 more Smart Citation
“…Complete connectivity between network nodes was the improvement of this algorithm. Also provided is the hybrid pre-key distribution method.Chakrabarti et al [19] and Kavitha et al [20] enhanced the scalability and connectivity of the previous approach.Dargahi et al [21] enhanced the hybrid method to get the keys for almost all network nodes, but didn"t get the exact number of keys to all network nodes. When compared to prior hybrid techniques, Akhbarifar et al [22] used a hybrid strategy and provided improved connectivity and resilience.…”
Section: ) Every Line Should Be Having Exactly Q+1 Pointsmentioning
confidence: 99%
“…Dargahi et al [21] (MHS) proposed an enhancement version of the above hybrid approach. For b blocks, they also used the same BIBD method.…”
Section: Endmentioning
confidence: 99%
“…Combinatorial design theory is the part of combinatorial mathematics that deals with the existence and construction of systems of finite sets whose the existence have specified numerical properties [ 23 ]. Just because of these specified, easy-to-implement, numerical properties of combinatorial design theory, a series of studies on KPD scheme based on combinatorial design theory have been developed rapidly [ 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 ]. The first deterministic KPD scheme proposed by Comtepe and Yene [ 1 ] based on combinatorial design theory, which mapped Balanced Incomplete Block designs (BIBD) and Generalized Quadrangles (GQ) to KPD schemes, made key connectivity up to 1.…”
Section: Related Workmentioning
confidence: 99%
“…In recent years, wireless sensor networks have received extensive attention due to their vast potential in many application environments. However, security of wireless sensor networks still remains one of the most critical challenges because sensor nodes are often placed in a hostile or dangerous environment [1]. Many epidemiological models [2][3][4][5][6] have been proposed to study and predict the spread of viruses in wireless networks motivated by the pioneering work of Murray [7] and Kephart and White [8,9].…”
Section: Introductionmentioning
confidence: 99%
“…where ( ), ( ), ( ), ( ), and ( ) denote the number of susceptible, exposed (infected, but not infectious), infectious, recovered, and vaccinated sensor nodes at time , respectively. , , , , , , , , and are the positive parameters of system (1) and for the specific meanings of them one can refer to [10]. Considering the time delays in system (1), Zhang and Si [11] proposed the following delayed SEIRS-…”
Section: Introductionmentioning
confidence: 99%