2015 IEEE International Conference on Computer and Communications (ICCC) 2015
DOI: 10.1109/compcomm.2015.7387601
|View full text |Cite
|
Sign up to set email alerts
|

A hierarchical key management scheme for wireless sensor networks based on identity-based encryption

Abstract: Abstract-Limited resources (such as energy, computing power, storage, and so on) make it impractical for wireless sensor networks (WSNs) to deploy traditional security schemes. In this paper, a hierarchical key management scheme is proposed on the basis of identity-based encryption (IBE).This proposed scheme not only converts the distributed flat architecture of the WSNs to a hierarchical architecture for better network management but also ensures the independence and security of the sub-networks. This paper f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 8 publications
(9 reference statements)
0
2
0
Order By: Relevance
“…However, the establishment and maintenance of three different types of keys which are network key, group key and pair wise key increases the memory consumption as well as computational overhead of each ordinary sensor node. A hierarchical KMS that employs identity-based encryption (IBE), has been proposed in [17]. The proposed scheme converts a WSN in the form of distributed flat architecture into the hierarchical architecture before applying KMS which is based on Boneh-Franklin and Diffie-Hellman (DH) algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…However, the establishment and maintenance of three different types of keys which are network key, group key and pair wise key increases the memory consumption as well as computational overhead of each ordinary sensor node. A hierarchical KMS that employs identity-based encryption (IBE), has been proposed in [17]. The proposed scheme converts a WSN in the form of distributed flat architecture into the hierarchical architecture before applying KMS which is based on Boneh-Franklin and Diffie-Hellman (DH) algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…Utilizing asymmetric cryptographic schemes [3][4][5] is considered impractical as they require extensive computation and large storage that are not suitable for implementation in sensors due to their inherit characteristics (i.e., limited memory, processing, and battery power). There are several approaches to designing secure key distribution schemes in WSNs.…”
Section: Introductionmentioning
confidence: 99%