2009 First International Communication Systems and Networks and Workshops 2009
DOI: 10.1109/comsnets.2009.4808910
|View full text |Cite
|
Sign up to set email alerts
|

Design of robust and secure encryption scheme for WSN using PKI (LWT-PKI)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…A key pool is constructed before the node deployment stage according to the clustering information pre-distribute key, which is set up to manage the key tree and achieve network security communication [6]. The system can manage network through remote control device.…”
Section: Bikps Pre-share Keymentioning
confidence: 99%
“…A key pool is constructed before the node deployment stage according to the clustering information pre-distribute key, which is set up to manage the key tree and achieve network security communication [6]. The system can manage network through remote control device.…”
Section: Bikps Pre-share Keymentioning
confidence: 99%
“…This scheme's principal goal is to ensure that each sensor data is aggregated within the WSN in a secure fashion, while fully preserving its privacy and integrity. Different from the traditional encryption fusion mechanism [10][11][12][13], the privacy scheme of wireless sensor network integrity verification based on homomorphic encryption has been studied. These protocols implement end-to-end security checks to ensure that data is not perceived during transmission.…”
Section: Introductionmentioning
confidence: 99%
“…Pair wise key predistribution scheme is used here. In [7], authors proposed a lightweight implementation of public key infrastructure (LWT-PKI). It uses public key encryption only for some specific tasks as session key setup between BS and sensors which give the network confidentiality and authentication.…”
Section: Introductionmentioning
confidence: 99%