2016
DOI: 10.1016/j.adhoc.2015.08.027
|View full text |Cite
|
Sign up to set email alerts
|

Modified access polynomial based self-healing key management schemes with broadcast authentication and enhanced collusion resistance in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
16
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 25 publications
(16 citation statements)
references
References 21 publications
0
16
0
Order By: Relevance
“…Sun et al [156] considered the multicast communications in WSNs, including, sink and many groups, where each group may have a powerful node and many low ordinary nodes. The powerful node acts as the group manager (GM), and is responsible for network security management, such as key issues, updating, revocation, intrusion detection, etc.…”
Section: Authentication Protocols For Iosmentioning
confidence: 99%
“…Sun et al [156] considered the multicast communications in WSNs, including, sink and many groups, where each group may have a powerful node and many low ordinary nodes. The powerful node acts as the group manager (GM), and is responsible for network security management, such as key issues, updating, revocation, intrusion detection, etc.…”
Section: Authentication Protocols For Iosmentioning
confidence: 99%
“…[7][8][9][10][11][12][13][14][15] These are useful in several settings such as group keys needed to be used for a short period because of frequent changes in the group structure. 12,14,16 In these protocols, group lifetime is divided into epochs called sessions, 7,8,12,17 where each session has a unique group key. At the beginning of each session, the GM transmits a broadcast message in order to provide a common key, called the session key, to each member of the group.…”
Section: Introductionmentioning
confidence: 99%
“…12,20 This approach decreases the work load on the GM and reduces network traffic as well as the risk of user exposure through traffic analysis. 7,8,12,17 Self-healing group key distribution protocols can broadly be classified into polynomial-based, exponential arithmetic-based, vector space secret sharing scheme-based, and bilinear pairing-based schemes. 12 Saez 21 first considered applying vector space secret sharing schemes instead of Shamir's secret sharing schemes to realize a self-healing key distribution scheme and sponsorization.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations