2009 Third International Conference on Sensor Technologies and Applications 2009
DOI: 10.1109/sensorcomm.2009.73
|View full text |Cite
|
Sign up to set email alerts
|

Establishing Pairwise Keys in Heterogeneous Two-Tiered Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(14 citation statements)
references
References 11 publications
0
14
0
Order By: Relevance
“…We will prove that our proposal is both secure and energy efficient by comparing with the schemes of LEKM [16], AP [17], and Boujelben's scheme [18].…”
Section: Security and Performance Analysismentioning
confidence: 90%
See 1 more Smart Citation
“…We will prove that our proposal is both secure and energy efficient by comparing with the schemes of LEKM [16], AP [17], and Boujelben's scheme [18].…”
Section: Security and Performance Analysismentioning
confidence: 90%
“…Boujelben et al proposed an "Establishing pairwise keys in heterogeneous two-tiered wireless sensor networks" in 2009 [18] (denoted as EPKH scheme). The Identity based cryptography was applied at inter-cluster tier, and a kind of unbalanced key distribution method combined with Blom's scheme [10] was proposed at the intra-cluster tier.…”
Section: B Contribution Of This Papermentioning
confidence: 99%
“…However, the computation increases drastically consuming a large amount of energy, reducing the efficiency of WSNs. Boujelben et al, (Manel Boujelben and Youssef, 2009) have proposed a pairwise Key Management protocol that is applied to two tiered Heterogeneous Wireless Sensor Networks. They have proposed probabilistic key predistribution which is used in the lower tier of the network architecture and public key cryptography in the upper tier.…”
Section: Related Workmentioning
confidence: 99%
“…In this context, either centralized or distributed solutions can be used. Centralized approaches, like those presented in [14]- [16], suppose the use of a dedicated entity for generating, distributing, and managing keys. In distributed techniques, instead, each couple of nodes negotiate key materials autonomously, as discussed in [17]- [23].…”
Section: Introductionmentioning
confidence: 99%
“…Note that distributed mechanisms presented in [17]- [20], [23], and presented before, are based on symmetric key encryption schemes. Further distributed approaches use asymmetric strategies, based on the usage of public key cryptography [10] [14][23] [24].…”
Section: Introductionmentioning
confidence: 99%