2014
DOI: 10.15837/ijccc.2014.1.235
|View full text |Cite
|
Sign up to set email alerts
|

Energy Efficient Key Management Scheme for Wireless Sensor Networks

Abstract: Abstract:Designing an efficient key establishment scheme is of great importance to the data security in Wireless Sensor Networks. The traditional cryptographic techniques are impractical in Wireless Sensor Networks because of associated high energy and computational overheads. This algorithm supports the establishment of three types of keys for each sensor node, an individual key shared with the base station, a pair wise key shared with neighbor sensor node, and a group key that is shared by all the nodes in t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(12 citation statements)
references
References 15 publications
0
12
0
Order By: Relevance
“…Suganthi et al [36] calculated the keys (individual keys and the pair-wise keys) during initialization using polynomial functions. In their approach, the base station shared the individual key and the neighbor nodes shared the pairwise keys.…”
Section: Polynomials Based Key Management Schemesmentioning
confidence: 99%
“…Suganthi et al [36] calculated the keys (individual keys and the pair-wise keys) during initialization using polynomial functions. In their approach, the base station shared the individual key and the neighbor nodes shared the pairwise keys.…”
Section: Polynomials Based Key Management Schemesmentioning
confidence: 99%
“…Sandirigama et al [17] used password-based key management with a combination of re-keying and authentication. Suganthi et al [18] proposed the energy efficient key management scheme by generating pair-wise keys and maintaining them without key sharing. However, these algorithms are not suitable for the drone environment.…”
Section: Related Workmentioning
confidence: 99%
“…In [12], Suganthi and Vembu have proposed an algorithm allowing the establishment of three types of keys for each sensor node without key broadcasting and a minimal base station involvement. The sensor node individual key is used for initial communication with the base station and is calculated through system parameters distributed before the network deployment.…”
Section: Related Workmentioning
confidence: 99%