2010
DOI: 10.1007/978-3-642-16988-5_9
|View full text |Cite
|
Sign up to set email alerts
|

From Key Predistribution to Key Redistribution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2012
2012
2014
2014

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(14 citation statements)
references
References 4 publications
0
14
0
Order By: Relevance
“…The availability of such a broadcast channel has been discussed in [Cichoń et al 2010;Liu and Ning 2004]. We distinguish between the underlying keys which are predistributed to the nodes, and the temporal keys which are broadcast by the base station and which the nodes may use for communication until the next broadcast.…”
Section: Broadcast-enchanced Key Predistributionmentioning
confidence: 99%
See 3 more Smart Citations
“…The availability of such a broadcast channel has been discussed in [Cichoń et al 2010;Liu and Ning 2004]. We distinguish between the underlying keys which are predistributed to the nodes, and the temporal keys which are broadcast by the base station and which the nodes may use for communication until the next broadcast.…”
Section: Broadcast-enchanced Key Predistributionmentioning
confidence: 99%
“…This straightforward approach benefits from reducing the base station's future broadcast load. However, it has the potential to reduce the connectivity and resilience of the remaining network (we define these terms in Section 2), and repeated revocations may lead to rapid degeneration of the remaining network [Cichoń et al 2010]. In Section 4 we discuss a practical way to design a BEKPS for efficient revocation, where repeated revocations increase the broadcast load but do not lead to network degeneration.…”
Section: Broadcast-enchanced Key Predistributionmentioning
confidence: 99%
See 2 more Smart Citations
“…Indeed, if it is possible to determine the locations of the nodes after deployment, for example using an online base station or GPS, it may be feasible to construct the intersection graph and therefore estimate the expansion, once the WSN has been deployed. This is likely to be relevant if post-deployment key management protocols are available such as key refreshing [2] or key redistribution [10], for which it could be useful to know as much as possible about the vulnerability of the WSN. Some key management protocols are able to provide targeted improvements to specific weak areas of the network, and we explain below how best to identify such weaknesses.…”
Section: Using Expansion As a Metricmentioning
confidence: 99%