2011 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC) 2011
DOI: 10.1109/icspcc.2011.6061682
|View full text |Cite
|
Sign up to set email alerts
|

LEP: A lightweight key management scheme based on ebs and polynomial for wireless sensor networks

Abstract: Key management is at the heart of securing wireless sensor networks. Exclusion Basis Systems (EBS) is a combinatorial framework for group key management. It is secure and efficient for dynamic key management; however it could not resist collusion attack. A novel scheme combining EBS with broadcasting polynomial, LEP was proposed to solve this problem. Compromised nodes can be evicted by rekeying. LEP employs EBS to refresh keys when there is no collusion attack, otherwise broadcasting polynomial is used to rek… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…Besides, other EBS-based key management schemes were also proposed. In [19], a lightweight key management scheme was proposed for WSNs. Moreover, [20] and [21] proposed EBS-based key management schemes for hierarchical and heterogeneous WSNs, respectively.…”
Section: Shellmentioning
confidence: 99%
“…Besides, other EBS-based key management schemes were also proposed. In [19], a lightweight key management scheme was proposed for WSNs. Moreover, [20] and [21] proposed EBS-based key management schemes for hierarchical and heterogeneous WSNs, respectively.…”
Section: Shellmentioning
confidence: 99%
“…The other security mechanisms such as secure routing, secure localization, authenticity and integrity are built upon the secure key management. Group key [4], [5] is one of the most important key management paradigms for group communication, which is both bandwidthefficient and energy-efficient. Hence, establishing a secure and efficient group key for energy-constrained WSN is an important concern to inhibit an adversary from attacking group communication.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, most research on MTC has focused on congestion control, resource management, key management [8, 9], and so forth; however, there are few studies on security aspects. Lu et al [10] point out that the existing challenges of M2M is energy efficiency (green), reliability, and security (GRS).…”
Section: Introductionmentioning
confidence: 99%