2013
DOI: 10.4028/www.scientific.net/amr.846-847.869
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Group Key Agreement Scheme for Wireless Sensor Networks Based on Merkle Identity Tree

Abstract: One of the key issues in wireless sensor networks is to design efficient and secure group key agreement scheme. The Merkle identity tree is firstly introduced, then an efficient scheme based on Merkle identity tree is proposed. With this scheme, the direct and secure communications between any subgroups without retransmission could be implemented. The security of the scheme can be assured under the complexity assumptions. The detailed analysis of the initialization procedure, subgroup key agreement procedure, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…In our opinion, the presence of a robot to distribute key material is not a very realistic assumption. The schemes in [31], [32] are based on a key tree which results in communication and computation costs which linearly increase with the number of group members. Finally, in [33], a secure and efficient key management scheme is proposed for multicast communication based on Elliptic Curve Cryptography (ECC).…”
Section: B Wireless Sensor Networkmentioning
confidence: 99%
“…In our opinion, the presence of a robot to distribute key material is not a very realistic assumption. The schemes in [31], [32] are based on a key tree which results in communication and computation costs which linearly increase with the number of group members. Finally, in [33], a secure and efficient key management scheme is proposed for multicast communication based on Elliptic Curve Cryptography (ECC).…”
Section: B Wireless Sensor Networkmentioning
confidence: 99%
“…Key management schemes of [15][16][17] describe this type of network architecture. However, the schemes of [16,17] are using asymmetric-key-based methods as the basis of their key establishment system. The scheme in [16] is based on the Merkle identity tree.…”
Section: Related Workmentioning
confidence: 99%
“…However, the schemes of [16,17] are using asymmetric-key-based methods as the basis of their key establishment system. The scheme in [16] is based on the Merkle identity tree. With this scheme, the direct and secure communications between any subgroup can be implemented and the delay of communication is decreased, making the scheme more suitable for WSNs.…”
Section: Related Workmentioning
confidence: 99%