2004
DOI: 10.1023/b:jons.0000015697.38671.ec
|View full text |Cite
|
Sign up to set email alerts
|

Combinatorial Optimization of Group Key Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
91
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 133 publications
(93 citation statements)
references
References 8 publications
0
91
0
Order By: Relevance
“…Exclusion Basis System (EBS) proposed a combinatorial clustering that attempts to minimize the number of rekeying messages while minimizing the number of keys stored by each sensor node [17,23,24]. In order to achieve this goal, EBS organizes nodes into overlapping groups that are, however, completely unrelated to the application needs [17].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Exclusion Basis System (EBS) proposed a combinatorial clustering that attempts to minimize the number of rekeying messages while minimizing the number of keys stored by each sensor node [17,23,24]. In order to achieve this goal, EBS organizes nodes into overlapping groups that are, however, completely unrelated to the application needs [17].…”
Section: Related Workmentioning
confidence: 99%
“…In order to achieve this goal, EBS organizes nodes into overlapping groups that are, however, completely unrelated to the application needs [17]. Furthermore, two EBS-based rekeying schemes require the knowledge of the positions of sensor nodes [23,19].…”
Section: Related Workmentioning
confidence: 99%
“…Eltoweissy et al proposed EBS to protect a group key from compromised nodes [12]. In an EBS, the key distribution server randomly picks k keys from k + m keys and distributes them to members.…”
Section: Related Workmentioning
confidence: 99%
“…Table 1 shows the parameters and their values employed in the simulations. In the EBS (Exclusion Basis System) [12] parameter, k + m refers to the size of key pool in a cluster and k refers to the size of the key ring in a member sensor. We compared DIRECT with a scheme which has no renewal mechanisms and a reactive key renewal scheme.…”
Section: Performance Evaluationmentioning
confidence: 99%
See 1 more Smart Citation