2009 WRI International Conference on Communications and Mobile Computing 2009
DOI: 10.1109/cmc.2009.223
|View full text |Cite
|
Sign up to set email alerts
|

Cluster-Based Security for Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…A set of defence methods based on different networking protocol layers are summarized by Chen et al [9], to show the threats and vulnerabilities present in a WSN. Abdullah and Hua [10] proposed a re-keying function protocol for wireless sensor network which uses the local administrative function as the master function. In some specific application we may need to access real-time from the sensor nodes.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…A set of defence methods based on different networking protocol layers are summarized by Chen et al [9], to show the threats and vulnerabilities present in a WSN. Abdullah and Hua [10] proposed a re-keying function protocol for wireless sensor network which uses the local administrative function as the master function. In some specific application we may need to access real-time from the sensor nodes.…”
Section: Literature Surveymentioning
confidence: 99%
“…Shared secret key generation (a) BS computes the shared secret key S sk (b) Select a random number a ∈ R Z * q (c) S sk = h(g a ) mod p Algorithm 1 Encryption key generation algorithm 1: BS selects a random number x ∈ R Z * q 2: R = g x mod p 3: z = m w ||R 4: s = x + R z 5: BS sends (R, s, m w ) to the sensor S i 6: Sensor node S i starts the below calculations 7: z * = m w ||R 8: m = R z * 9: if g s = R · g m then10:…”
mentioning
confidence: 99%
“…Younis et al [13] proposed SLEACH that provides security in LEACH by using the building block of SPINS (Security Protocol for Sensor Network), symmetric-key method and MAC (Message Authentication Code).J. Ibriq and I. Mahgoub [14] proposed a secure hierarchical energy efficient routing protocol (SHEER) which provides secure communication at the network layer.…”
Section: Security Schemes For Wsnmentioning
confidence: 99%
“…Similarly, key establishment among sensors at the post-deployment phase is not feasible as sensors are normally deployed randomly. A link layer group communication scheme [ 23 ] for the wireless sensor networks is proposed to achieve security of the node-to-node communication. Though the scheme is independent of the key management and distribution architecture, there is no mention about data confidentiality, which is highly essential for the WSNs deployed on the battle field and similar security applications.…”
Section: Related Workmentioning
confidence: 99%