2016
DOI: 10.1007/s11276-016-1228-9
|View full text |Cite
|
Sign up to set email alerts
|

Energy efficient geographical key management scheme for authentication in mobile wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 44 publications
0
4
0
Order By: Relevance
“…Because of the limited energy, computing power, storage capacity and mobility of WSN nodes the traditional broadcast authentication protocol cannot be applied directly, so it is urgent to design a corresponding broadcast authentication protocol according to the above characteristics. Currently, many energy-efficient broadcast protocols and algorithms have been proposed [16][17][18][19][20], and there are two main WSN broadcast authentication ways: one is signature authentication [15], but the disadvantage of this way is that it uses the public key cryptography which is expensive and hard to be applied in WSN; the other way is based on the message authentication code (MAC), such as one-way hash chain method and the µTESLA protocol proposed by Perrig according to the SPIN security model [5], in which the µTESLA protocol can realize asymmetric authentication based on the delay authentication, but the delay increases gradually with the time change.…”
Section: Identity Authenticationmentioning
confidence: 99%
“…Because of the limited energy, computing power, storage capacity and mobility of WSN nodes the traditional broadcast authentication protocol cannot be applied directly, so it is urgent to design a corresponding broadcast authentication protocol according to the above characteristics. Currently, many energy-efficient broadcast protocols and algorithms have been proposed [16][17][18][19][20], and there are two main WSN broadcast authentication ways: one is signature authentication [15], but the disadvantage of this way is that it uses the public key cryptography which is expensive and hard to be applied in WSN; the other way is based on the message authentication code (MAC), such as one-way hash chain method and the µTESLA protocol proposed by Perrig according to the SPIN security model [5], in which the µTESLA protocol can realize asymmetric authentication based on the delay authentication, but the delay increases gradually with the time change.…”
Section: Identity Authenticationmentioning
confidence: 99%
“…In this way, the recovery process is completed by cascading, that is, backup B of A is moved to position of A and newly backup of B is moved to position of B (lines [34][35][36][37][38][39]. If backup node B is critical and its backup is other than its primary, then it notifies to its backup and moves to position of its primary by cascading (lines [40][41][42][43] [34][35][36][37][38][39]. If the backup is critical and its backup is other than its primary, then the recovery procedure takes time NK (lines [40][41][42][43].…”
Section: Proposed Algorithmmentioning
confidence: 99%
“…37 A cluster-based scheme is proposed to attain security by a private key management. 38 Routing protocol for mobile ad hoc network (MANET) is validated through testing methodology. 39 Wireless sensor and actuator networks are modeled using colored Petri nets.…”
Section: Related Workmentioning
confidence: 99%
“…These functions protect enterprise data from information loss or failure that arises from natural disasters, physical operating environment, etc. [6][7][8][9].…”
Section: Introductionmentioning
confidence: 99%