2016
DOI: 10.1109/tmc.2015.2486758
|View full text |Cite
|
Sign up to set email alerts
|

Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach

Abstract: Key pre-distribution algorithms have recently emerged as efficient alternatives of key management in today's secure communications landscape. Secure routing techniques using key pre-distribution algorithms require special algorithms capable of finding optimal secure overlay paths. To the best of our knowledge, the literature of key pre-distribution systems is still facing a major void in proposing optimal overlay routing algorithms. In the literature work, traditional routing algorithms are typically used twic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 29 publications
0
8
0
Order By: Relevance
“…Gateway nodes can share and load the loads on wireless sensor nodes and prolong the lifetime of network work [1]. Gharib et al (2016) pointed out that the dense pre-allocation scheme can enable any two nodes in the network to establish a shared key directly. When the number of the captured nodes is not more than the threshold value, the entire network is secure [2].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Gateway nodes can share and load the loads on wireless sensor nodes and prolong the lifetime of network work [1]. Gharib et al (2016) pointed out that the dense pre-allocation scheme can enable any two nodes in the network to establish a shared key directly. When the number of the captured nodes is not more than the threshold value, the entire network is secure [2].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Eschenauer and Gligor propose the original idea of Figure 2. An example of overlay routing using asymmetric key pre-distribution [32].…”
Section: A Categorical Survey Of Key Pre-distribution Algorithms 31 Random Graph Key Pre-distributionmentioning
confidence: 99%
“…Gharib et al [32] propose an overlay routing algorithm for key pre-distribution schemes with the main advantage of being able to jointly optimize the costs of overlay and underlay paths. The other important advantage of this algorithm is being agnostic to the choice of key pre-distribution scheme.…”
Section: A Comparison Of Overlay Routing Algorithms Using Key Pre-distributionmentioning
confidence: 99%
“…Key pre-distribution (KPD) scheme is one of the most extensive research directions of symmetric key management in WSNs [ 15 , 16 , 17 ]. A typical KPD scheme contains three phases: key pre-distribution, shared-key discovery and path-key establishment [ 13 , 18 ].…”
Section: Introductionmentioning
confidence: 99%
“…KPD schemes in WSNs are classified into probabilistic KPD scheme and deterministic KPD scheme based on the manner of key selection [ 6 , 12 , 16 ]. Typical probabilistic KPD schemes include random KPD, Q-composite KPD and polynomial pool based KPD [ 13 ].…”
Section: Introductionmentioning
confidence: 99%