2005
DOI: 10.1145/1065545.1065548
|View full text |Cite
|
Sign up to set email alerts
|

A pairwise key predistribution scheme for wireless sensor networks

Abstract: To achieve security in wireless sensor networks, it is important to be able to encrypt and authenticate messages sent between sensor nodes. Before doing so, keys for performing encryption and authentication must be agreed upon by the communicating parties. Due to resource constraints, however, achieving key agreement in wireless sensor networks is non-trivial. Many key agreement schemes used in general networks, such as Diffie-Hellman and other public-key based schemes, are not suitable for wireless sensor net… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
611
0
4

Year Published

2008
2008
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 797 publications
(615 citation statements)
references
References 12 publications
0
611
0
4
Order By: Relevance
“…These are the only solutions when t ¼ m, since m 00 wþ S 0 m AE Ç > w, for m 00 > m. So, the number of solutions when t ¼ m, is P mÀ1 l¼ 0 S 1 , where S 1 is as given. Hence for all values of t, 1 t T, there are P T t¼1 P tÀ1 t¼0 S 1 solutions satisfying (8). We give the example given in [19] to demonstrate the above theorem.…”
Section: Case (Ii): Ifmentioning
confidence: 82%
See 1 more Smart Citation
“…These are the only solutions when t ¼ m, since m 00 wþ S 0 m AE Ç > w, for m 00 > m. So, the number of solutions when t ¼ m, is P mÀ1 l¼ 0 S 1 , where S 1 is as given. Hence for all values of t, 1 t T, there are P T t¼1 P tÀ1 t¼0 S 1 solutions satisfying (8). We give the example given in [19] to demonstrate the above theorem.…”
Section: Case (Ii): Ifmentioning
confidence: 82%
“…Key predistribution in sensor networks was first discussed in by Eschenauer and Gligor in [9]. Other key predistribution schemes were discussed in [5,8,[13][14][15]23]. For application of combinatorial designs in key predistribution, one may refer to [2,4,16,17,20].…”
Section: Introductionmentioning
confidence: 99%
“…Various key distribution schemes have been studied for wireless sensor networks, considering the resource-constrained sensor nodes used in these networks [7]- [13]. Eschenauer and Gligor [5] proposed a random key pre-distribution scheme.…”
Section: Related Workmentioning
confidence: 99%
“…In the literature, the problem of key distribution in WSNs is addressed by several probabilistic key predistribution schemes such as [3,5,6,7]. One of the first key management schemes using this approach is Eschenauer and Gligor's basic scheme [3].…”
Section: Introduction and Related Workmentioning
confidence: 99%
“…Besides, if λ nodes have been captured, whole system gets compromised. Du et al [6] further improved Blom's scheme and transformed it to a general probabilistic case that is Murat Ergun is supported by TÜBİTAK BİDEB scholarship. directly applicable to WSNs.…”
Section: Introduction and Related Workmentioning
confidence: 99%