2012
DOI: 10.1155/2012/547471
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Hierarchical Key Management Scheme in Wireless Sensor Network

Abstract: Due to the vulnerable environment, limited recourse and open communication channel, wireless sensor networks (WSNs) are necessary to be protected from various attacks. The key management is an important way to protect the communication in WSNs. In this paper, we present a hierarchical key management scheme (HKMS) which can efficiently enhance the security and survivability for the clustered WSNs. Different from previous works, the HKMS distributes keys based on hop counts and one-way function by the clustered … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
27
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 24 publications
(27 citation statements)
references
References 14 publications
0
27
0
Order By: Relevance
“…Distributed scheme Centralized scheme HKMS [9] LEAP [10] LEAP+ [11] SHELL [13] LKHW [8] HIKES [12,14] Among the first proposed centralized hierarchical key management schemes in the literature, we find LKHW [8]. This scheme is based on a logical key hierarchy.…”
Section: Hierarchical Key Management Schemes In Wsnsmentioning
confidence: 99%
See 3 more Smart Citations
“…Distributed scheme Centralized scheme HKMS [9] LEAP [10] LEAP+ [11] SHELL [13] LKHW [8] HIKES [12,14] Among the first proposed centralized hierarchical key management schemes in the literature, we find LKHW [8]. This scheme is based on a logical key hierarchy.…”
Section: Hierarchical Key Management Schemes In Wsnsmentioning
confidence: 99%
“…In [9], authors presented a distributed hierarchical key management named HKMS for clustered WSNs. HKMS [9] is designed for homogenous WSNs, it does not employ special sensor nodes (e.g.…”
Section: Hierarchical Key Management Schemes In Wsnsmentioning
confidence: 99%
See 2 more Smart Citations
“…2), reducing the communication cost, the storage overhead and also improving the resilience against the node capture attack become a must. Recently several enhanced secure cluster based routing protocols have been proposed in literature [ 20,26,31,33,34 ] to achieve both security and efficiency for WSNs. Figure 1 shows the basic security requirements of WSNs.…”
Section: Introductionmentioning
confidence: 99%