2011
DOI: 10.1007/s11277-011-0302-y
|View full text |Cite
|
Sign up to set email alerts
|

Centralized Key Management Scheme in Wireless Sensor Networks

Abstract: Today, key management is widely recognized as an important aspect of security in wireless sensor networks. In these networks, sensor nodes can be either mobile or static. Therefore, supporting the mobility of the nodes can be regarded as a purpose of key management schemes. In our previous work, we presented a key management scheme that was more efficient with respect to security and connectivity compared to the other ones. In that scheme, it is assumed that the nodes are static. In this paper we are going to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(15 citation statements)
references
References 12 publications
0
15
0
Order By: Relevance
“…Network model According to different applications and network style, the Internet of things is divided into different regions [9]. Assuming each regions has Control Center(CC) ,which collect information from other nodes by GPS network architecture, and compute location such as distance and angle which are used to divide regions.…”
Section: Key Management Schemementioning
confidence: 99%
“…Network model According to different applications and network style, the Internet of things is divided into different regions [9]. Assuming each regions has Control Center(CC) ,which collect information from other nodes by GPS network architecture, and compute location such as distance and angle which are used to divide regions.…”
Section: Key Management Schemementioning
confidence: 99%
“…Various work have been proposed so far in the field of key management with many of them focusing on the random key distribution among the nodes in the network [1]Chan et al [2]the q-composite key pre-distribution, Zhu et al [3] give Localized Encryption and Authentication Protocol(LEAP) Other schemes based on the distance were also proposed for the key management [4,5,6,7]. The RKPH [4] scheme is based on Random key distribution and uses different keys in different clusters and takes distance of sensor node from their cluster head into account.…”
Section: Related Workmentioning
confidence: 99%
“…The RKPH [4] scheme is based on Random key distribution and uses different keys in different clusters and takes distance of sensor node from their cluster head into account. It preloads some base keys into sensor and the new keys are derived by considering the distance of sensor node from their cluster head and to which cluster does the sensor node belongs.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations