2006
DOI: 10.1007/11836810_19
|View full text |Cite
|
Sign up to set email alerts
|

Diverging Keys in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…As in Ren et al [2006], the system initializes the nodes so that each pair of neighbour nodes establishes a key for this pair. Any method can be used: preloading with a common key, key infection, or a random predistribution scheme.…”
Section: Initializationmentioning
confidence: 99%
“…As in Ren et al [2006], the system initializes the nodes so that each pair of neighbour nodes establishes a key for this pair. Any method can be used: preloading with a common key, key infection, or a random predistribution scheme.…”
Section: Initializationmentioning
confidence: 99%
“…The adversary that captures some keys in period t is not able to decrypt messages in period t + 1 (forward security) or t − 1 (backward security). In paper [6] a key evolution protocol with forward security has been proposed. Protocol from [21] offers both forward and backward security.…”
Section: Predistribution Schemesmentioning
confidence: 99%
“…Their scheme also employs a one-way function F but, based on a key distribution mechanism in [11], incorporates an element of randomness. In their scheme, if nodes A and B share key k AB and A wants to send a message to B, then A encrypts the message using a key k ′ = F (k AB , i), where i is chosen uniformly at random from the set {0, 1, .…”
Section: Forward Security In Sensor Networkmentioning
confidence: 99%