2012
DOI: 10.1007/978-3-642-27299-8_26
|View full text |Cite
|
Sign up to set email alerts
|

Survey on Key Pre Distribution for Security in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…Step 1: For each node i, the KDC randomly chooses a vector s i with a weight of 3 √ w/2 and publishes it.…”
Section: ) Generation Of the Public Key And Private Key For Space Nodesmentioning
confidence: 99%
See 3 more Smart Citations
“…Step 1: For each node i, the KDC randomly chooses a vector s i with a weight of 3 √ w/2 and publishes it.…”
Section: ) Generation Of the Public Key And Private Key For Space Nodesmentioning
confidence: 99%
“…Step 2: Node i generates its circulant sub-matrix S i by s i and chooses vector h i,2 and h i, 3 . Here, wt(h i,2 ) = 3 √ w/2, wt(h i,3 ) = w/2.…”
Section: ) Generation Of the Public Key And Private Key For Space Nodesmentioning
confidence: 99%
See 2 more Smart Citations
“…The wireless sensor networks (WSNs) are applied in many applications ranging from military to health care . The sensor nodes are bounded by memory space, energy, and computational power . These nodes work in an infrastructureless and dynamically changing environment and direct the amassed data to the sink node for further interpretation.…”
Section: Introductionmentioning
confidence: 99%