2014 Second International Conference on Advanced Cloud and Big Data 2014
DOI: 10.1109/cbd.2014.39
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Key Management Scheme Based on ECC for Heterogeneous Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…There are some schemes (such as [34,35]) for preventing the node replication attacks. In our scheme, the BS pre- In Figure 5, our scheme has a lower computational cost than schemes [13,15,17]. Du et al's scheme lacks location information protection and message authentication during the session key establishment process and, thus, has the lowest computational cost.…”
Section: Security Performance Discussionmentioning
confidence: 98%
See 3 more Smart Citations
“…There are some schemes (such as [34,35]) for preventing the node replication attacks. In our scheme, the BS pre- In Figure 5, our scheme has a lower computational cost than schemes [13,15,17]. Du et al's scheme lacks location information protection and message authentication during the session key establishment process and, thus, has the lowest computational cost.…”
Section: Security Performance Discussionmentioning
confidence: 98%
“…Wang et al [15] proposed a distributed key management scheme that makes communication links more secure. In this scheme, Wang et al have taken some improvement measures to address the two issues in the scheme [11].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Second, the ECC digital signature (Rivest et al, 1992) is used to ensure the reliability of the message source, and the Diffie-Hellman key exchange idea (Maurer and Wolf 1998) is used to generate the shared key for the c-neighbour nodes. Wang et al (2014) found that Du et al's scheme lacked authentication between c-neighbour nodes during the shared key establishment process and then used identity encryption technology to authenticate the message source (labelled as Wang et al's distributed key management scheme). We find that there is a hypothesis problem about the process of establishing the communication key in Wang et al's scheme.…”
Section: Introductionmentioning
confidence: 99%