2012
DOI: 10.4304/jnw.7.7.1009-1016
|View full text |Cite
|
Sign up to set email alerts
|

(t, n) Secret Sharing Scheme Based on Cylinder Model in Wireless Sensor Networks

Abstract: Since the existence of characteristics of heterogeneity, limited energy, complexity and so forth, it turns into a research hot spot on the security mechanism of wireless sensor networks (WSN), especially the problems on the key management. On regard of the deficiency of extant secret sharing schemes, we develop a (t, n) threshold secret sharing scheme which is based on the cylinder model, including the procedures of master-key reconfiguration and sub-key updating. This scheme enables several … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 16 publications
(13 citation statements)
references
References 13 publications
0
13
0
Order By: Relevance
“…The FTSP this paper mentioned (Flooding Time Synchronization Protocol) is proposed by Branislav Kusy of Vanderbilt University firstly [24]. FTSP method realizes time synchronization between sender and receiver by single broadcast message [25][26][27][28]. In considering several requirements in practical application, this paper improved the method, and realizes the time synchronization requirements of multi-hop network nodes.…”
Section: Figure 1 Sending and Receiving Delay Flow Chartmentioning
confidence: 99%
“…The FTSP this paper mentioned (Flooding Time Synchronization Protocol) is proposed by Branislav Kusy of Vanderbilt University firstly [24]. FTSP method realizes time synchronization between sender and receiver by single broadcast message [25][26][27][28]. In considering several requirements in practical application, this paper improved the method, and realizes the time synchronization requirements of multi-hop network nodes.…”
Section: Figure 1 Sending and Receiving Delay Flow Chartmentioning
confidence: 99%
“…Next, the probability of 1 E and 2 E are analyzed. For two communicating entities of source node and destination node, OHS's number of neighbors obeys the binomial distribution.…”
Section: Cooperation Startmentioning
confidence: 99%
“…In the network system, in addition to the benign nodes, there may also exists some malicious nodes and selfish nodes, who try to interfere with the normal operation of the network [1,2]. In order to obtain the reliable communication services and enhance the security of the system, researches of the subjective trust have been conducted in many areas, such as e-commerce, P2P network, etc., [3].…”
Section: Introductionmentioning
confidence: 99%