Future Generation Communication and Networking (FGCN 2007) 2007
DOI: 10.1109/fgcn.2007.32
|View full text |Cite
|
Sign up to set email alerts
|

A PKC-Based Node Revocation Scheme in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…The amount of data attributes that can be associated with each sensor relies on the size of the Wireless(W) Sensor(S) Network(N) that can improve the network connectivity. Two types of pool based [12] polynomial key allocation with the Paillier Cryptosystem Algorithm [14], significantly improving network flexibility for wireless(W) network(N) replication attacks. Keeping communication costs intact indicates that the creation of encrypted keys and decoding times is less when compared to encryption systems and systems that are more flexible in denial of service attacks which is used for Paillier algorithm which is very difficult because there are not many important numbers.…”
Section: Conclusion and Future Scopementioning
confidence: 99%
“…The amount of data attributes that can be associated with each sensor relies on the size of the Wireless(W) Sensor(S) Network(N) that can improve the network connectivity. Two types of pool based [12] polynomial key allocation with the Paillier Cryptosystem Algorithm [14], significantly improving network flexibility for wireless(W) network(N) replication attacks. Keeping communication costs intact indicates that the creation of encrypted keys and decoding times is less when compared to encryption systems and systems that are more flexible in denial of service attacks which is used for Paillier algorithm which is very difficult because there are not many important numbers.…”
Section: Conclusion and Future Scopementioning
confidence: 99%
“…In [26], the authors propose a key revocation scheme based on public key cryptography that demands periodical certificate broadcast. They propose the use of hash function chains instead of digital signatures in order to conserve the limited resources of nodes.…”
Section: Related Workmentioning
confidence: 99%