2005
DOI: 10.1016/j.adhoc.2004.08.012
|View full text |Cite
|
Sign up to set email alerts
|

Group key management scheme for large-scale sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
31
0

Year Published

2006
2006
2012
2012

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 50 publications
(31 citation statements)
references
References 14 publications
0
31
0
Order By: Relevance
“…Recently, some work has been done in security of wireless sensor networks where sensors are anonymous [22,34]. Extending one of the random key pre-distribution schemes proposed in literature to this case can be an interesting research problem.…”
Section: Discussionmentioning
confidence: 99%
“…Recently, some work has been done in security of wireless sensor networks where sensors are anonymous [22,34]. Extending one of the random key pre-distribution schemes proposed in literature to this case can be an interesting research problem.…”
Section: Discussionmentioning
confidence: 99%
“…In this way, the key distribution server can evict the compromised nodes from a communication group using only m messages. Eltoweissy et al also applied the EBS to the key management in Wireless Sensor Networks (WSNs) in [10]. Sensors first determine the cluster to which they belong through the location information broadcasted by the sink.…”
Section: Related Workmentioning
confidence: 99%
“…Exclusion Basis System (EBS) proposed a combinatorial clustering that attempts to minimize the number of rekeying messages while minimizing the number of keys stored by each sensor node [17,23,24]. In order to achieve this goal, EBS organizes nodes into overlapping groups that are, however, completely unrelated to the application needs [17].…”
Section: Related Workmentioning
confidence: 99%
“…In order to achieve this goal, EBS organizes nodes into overlapping groups that are, however, completely unrelated to the application needs [17]. Furthermore, two EBS-based rekeying schemes require the knowledge of the positions of sensor nodes [23,19]. Implementing a location service in WSNs, especially a secure one, is quite a difficult task [15].…”
Section: Related Workmentioning
confidence: 99%