2006
DOI: 10.1109/tdsc.2006.2
|View full text |Cite
|
Sign up to set email alerts
|

A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge

Abstract: To achieve security in wireless sensor networks, it is important to be able to encrypt messages sent among sensor nodes. Keys for encryption purposes must be agreed upon by communicating nodes. Due to resource constraints, achieving such key agreement in wireless sensor networks is non-trivial. Many key agreement schemes used in general networks, such as Diffie-Hellman and public-key based schemes, are not suitable for wireless sensor networks. Pre-distribution of secret keys for all pairs of nodes is not viab… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 162 publications
(15 citation statements)
references
References 27 publications
0
15
0
Order By: Relevance
“…However, it fails to provide pair-wise authentication and requires significant communication overhead 13 . Several solutions based on 17 were subsequently proposed 34,35,36,37 . These latter schemes modified the random key pre-distribution scheme by increasing connectivity between nodes or decreasing storage overhead of sensor nodes.…”
Section: Random Key Pre-distributionmentioning
confidence: 99%
“…However, it fails to provide pair-wise authentication and requires significant communication overhead 13 . Several solutions based on 17 were subsequently proposed 34,35,36,37 . These latter schemes modified the random key pre-distribution scheme by increasing connectivity between nodes or decreasing storage overhead of sensor nodes.…”
Section: Random Key Pre-distributionmentioning
confidence: 99%
“…Previous location-aware approaches [2, 3, 5, 6] assume the uniform deployment model, where a sensing field is a flat area with a uniform geographical feature. In real world, however, a target sensing field is nonuniform.…”
Section: Background and Problemmentioning
confidence: 99%
“…In this section, we analyze the performance of G en D ep . We compare our method to the previous location-aware key management schemes based on the fixed deployment model, such as [5] and [2].…”
Section: Performance Evaluationmentioning
confidence: 99%
See 2 more Smart Citations