2013
DOI: 10.1002/sec.707
|View full text |Cite
|
Sign up to set email alerts
|

Novel distributed key revocation scheme for wireless sensor networks

Abstract: Key revocation plays an essential role in ensuring the confidentiality of wireless sensor networks following the compromise of one or more of the network nodes. The distributed key revocation protocol presented by Chan et al. has a rapid reaction time and avoids the single‐point failure problem inherent in centralized schemes. However, the scheme is computationally complex, requires a large storage space, and incurs high communication overheads. Accordingly, this paper proposes a novel distributed, scalable, a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…Further propositions (Chuanget al, 2010;Chao et al, 2013) regarding distributed node revocation in sensor networks demonstrate the usefulness and viability of the CGPM scheme, since many of them build their solutions upon this framework and employ with the basic properties defined in (Chan et al, 2005) to prove their correctness.…”
Section: ) Distributed Revocation Schemesmentioning
confidence: 98%
See 3 more Smart Citations
“…Further propositions (Chuanget al, 2010;Chao et al, 2013) regarding distributed node revocation in sensor networks demonstrate the usefulness and viability of the CGPM scheme, since many of them build their solutions upon this framework and employ with the basic properties defined in (Chan et al, 2005) to prove their correctness.…”
Section: ) Distributed Revocation Schemesmentioning
confidence: 98%
“…To further improve the CGPM scheme (Chan et al, 2005) in terms of storage space requirement, computational and communication overhead, Chao et al (2013) propose a new distributed revocation scheme based on Blom's ‫-ݐ‬secure property (Blom, 1985).…”
Section: ) Cyll Schemementioning
confidence: 99%
See 2 more Smart Citations
“…The distributed revocation protocol proposed in (Chao et al, 2013) consists of four phases, that is, offline initialization, connection establishment, voting, and revocation completion.…”
Section: Novel Distributed Key Revocation Scheme (Dkrs)mentioning
confidence: 99%