2010
DOI: 10.5121/ijnsa.2010.2406
|View full text |Cite
|
Sign up to set email alerts
|

Security in Wireless Sensor Networks: Key Management Module in SOOAWSN

Abstract: ABSTRACT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 20 publications
0
9
0
Order By: Relevance
“…Initially, after the deployment of nodes in the network, nodes with high energy resources, wide communication range and high processing capacity as cluster heads. Cluster keys for cluster heads and pairwise keys for nodes are generated by the sink through EBS [3]. Whenever a node moves from currently connected cluster to another in the network, the mobility based key management scheme is triggered.…”
Section: Problem and Overviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Initially, after the deployment of nodes in the network, nodes with high energy resources, wide communication range and high processing capacity as cluster heads. Cluster keys for cluster heads and pairwise keys for nodes are generated by the sink through EBS [3]. Whenever a node moves from currently connected cluster to another in the network, the mobility based key management scheme is triggered.…”
Section: Problem and Overviewmentioning
confidence: 99%
“…The EBS key set contains the pair wise keys for intra-cluster and inter-cluster communication. The cluster head upon detecting a compromised node in its cluster sends a request to sink to perform re-keying operation [3]. The re-keying process utilizes the hashing function for authentication and nodes are recovered in a secured manner.…”
Section: Problem and Overviewmentioning
confidence: 99%
“…So, the network will get destructed if a hacker tries to become the cluster head of the cluster. Examples of this type of attack are the selective forwarding and the sinkhole attacks (Abuhelaleh and Elleithy, 2010). …”
Section: Network Security In Sensor Networkmentioning
confidence: 99%
“…Also, they proved that their proposed solutions provide protection against various privacy disclosure attacks, such as eavesdropping and hop-by-hop trace back attacks. Abuhelaleh and Elleithy (2010) have proposed a special kind of architecture to the cluster hierarchy of wireless sensor networks. The most interesting protocol that has been proposed for this kind of architecture is LEACH.…”
Section: Key Management In Wireless Sensor Networkmentioning
confidence: 99%
See 1 more Smart Citation