2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing 2008
DOI: 10.1109/iih-msp.2008.138
|View full text |Cite
|
Sign up to set email alerts
|

An AVL Tree-Based Dynamic Key Management in Hierarchical Wireless Sensor Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(12 citation statements)
references
References 7 publications
0
12
0
Order By: Relevance
“…When messages have to be sent to all the nodes, we use the A VL tree root key because this key is known to everyone [17].…”
Section: Avl Treementioning
confidence: 99%
“…When messages have to be sent to all the nodes, we use the A VL tree root key because this key is known to everyone [17].…”
Section: Avl Treementioning
confidence: 99%
“…The approach based on M‐arry tree is not strong, but the number of exchanged messages to install keys is of logarithmic order. Also, in the approach based on the AVL tree , the number of exchanged messages to install keys is of logarithmic order, but an approach such as micro public key requires a large number of updates. With the SecCOSEN approach, it is not possible to establish secured links when a new sensor node is added to the network because the existing nodes have already deleted the remaining keys.…”
Section: State Of the Artmentioning
confidence: 99%
“…Also, the scheme in [10] suffers from poor resilience under node compromises and all keys have to be refreshed very quickly. In [11], a new protocol for cluster-head selection is proposed, and ideas are proposed for key additions and revocations under network dynamics via one-way hash functions. Trust protocols are also designed during initial cluster setup.…”
Section: A Rkp Based Schemesmentioning
confidence: 99%