2004
DOI: 10.1007/978-3-540-30108-0_18
|View full text |Cite
|
Sign up to set email alerts
|

Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

Abstract: Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pairwise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
344
0
2

Year Published

2005
2005
2016
2016

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 244 publications
(346 citation statements)
references
References 26 publications
0
344
0
2
Order By: Relevance
“…Many security proposals for WSNs (e.g., [5,16,17,18,19,20,21,22,23,24]) have focused on efficient key management of symmetric encryption schemes. Perrig et al [5] proposed SPINS, a suite of efficient symmetric key based security building blocks.…”
Section: Related Workmentioning
confidence: 99%
“…Many security proposals for WSNs (e.g., [5,16,17,18,19,20,21,22,23,24]) have focused on efficient key management of symmetric encryption schemes. Perrig et al [5] proposed SPINS, a suite of efficient symmetric key based security building blocks.…”
Section: Related Workmentioning
confidence: 99%
“…There have been a large number of recent proposals for key predistribution schemes, mostly explicitly targeted at wireless sensor network applications ( [4] provides a good survey from 2005, but much has happened since). A substantial number of these consider the case of homogeneous, static nodes which are deployed with no location control.…”
Section: Research Directionsmentioning
confidence: 99%
“…According to the network structure, the schemes can be divided into centralized key distribution schemes [9] and distributed key distribution schemes [3,10]. According to the probability of key sharing between a pair of sensor nodes, the key distribution schemes can be classified into deterministic approaches [2,8] and probabilistic approaches [3,10]. An investigation of key distribution schemes for WSNs can be found in References [1,11].…”
Section: Related Workmentioning
confidence: 99%
“…The KeyRev scheme depends on a unique key shared by all nodes in the network and the unique key is distributed to the network using an efficient group communication scheme [7]. In addition, the proposed scheme does not depend on any specific key distribution schemes and thus, the KeyRev scheme can be extended for implementation with other key distribution schemes, for example, the schemes proposed in Reference [5,8].…”
Section: Introductionmentioning
confidence: 99%