2011
DOI: 10.1007/s00779-011-0365-5
|View full text |Cite
|
Sign up to set email alerts
|

RiSeG: a ring based secure group communication protocol for resource-constrained wireless sensor networks

Abstract: Securing group communication in wireless sensor networks has recently been extensively investigated. Many works have addressed this issue, and they have considered the grouping concept differently. In this paper, we consider a group as being a set of nodes sensing the same data type, and we alternatively propose an efficient secure group communication scheme guaranteeing secure group management and secure group key distribution. The proposed scheme (RiSeG) is based on a logical ring architecture, which permits… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 34 publications
(23 citation statements)
references
References 24 publications
0
23
0
Order By: Relevance
“…As shown in Fig. 12, ED: 3Á(C dec + C verif ) RiSeG [8,9] GC: nÁjIDj + (t + 1)Álog(q) + T + (d G , Q G ) ED: 2ÁjIDj + (t + 1)Álog(q) + T + Q G GC: C kg + C enc + C sign ED: C dec + C verif GC: C kg + 2C kc + 2C enc + C sign ED: 2C kc + C enc + C dec + C verif LNT GC: nÁjIDj + (t + 1)Álog(q) + Private/public key ED: dÁjIDj + (t + 1)Álog(q) + GC public key.…”
Section: Durationmentioning
confidence: 90%
See 4 more Smart Citations
“…As shown in Fig. 12, ED: 3Á(C dec + C verif ) RiSeG [8,9] GC: nÁjIDj + (t + 1)Álog(q) + T + (d G , Q G ) ED: 2ÁjIDj + (t + 1)Álog(q) + T + Q G GC: C kg + C enc + C sign ED: C dec + C verif GC: C kg + 2C kc + 2C enc + C sign ED: 2C kc + C enc + C dec + C verif LNT GC: nÁjIDj + (t + 1)Álog(q) + Private/public key ED: dÁjIDj + (t + 1)Álog(q) + GC public key.…”
Section: Durationmentioning
confidence: 90%
“…The idea of secure group communication with resourceconstrained group controller was first addressed by Cheikhrouhou et al in their paper RiSeG [8,9]. Yet, the proposed scheme presents an O(n) latency in the rekeying process and, therefore, cannot endure large scale WSNs.…”
Section: Contributionmentioning
confidence: 99%
See 3 more Smart Citations