2014
DOI: 10.1155/2014/490202
|View full text |Cite
|
Sign up to set email alerts
|

GENDEP: Location-Aware Key Management for General Deployment of Wireless Sensor Networks

Abstract: Limited capabilities of tiny sensor node make it difficult to build a secure wireless sensor network. To cope with this problem, location-aware key predistribution schemes have been studied but without considering irregularity of real sensing fields. They were designed for ideal sensing fields divided into uniform regular polygons but false is the real sensing field, where we face irregular obstacles, undulations, and boundaries. In this paper, we tackle this problem from practical sense and first introduce th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 28 publications
0
3
0
Order By: Relevance
“…In the key pre-distribution phase, the original key pool is divides into many smaller pools, each of which is associated to different group. This group-based deployment model was further developed in Bag and Roy (2013) and Lee and Kwon (2014). Although these schemes can gain substantial improvement over exiting schemes that do not exploit deployment, they are only suitable to scenarios where deployment knowledge can be explored and this kind of information is not available in a generic deployment scenario.…”
Section: Related Workmentioning
confidence: 99%
“…In the key pre-distribution phase, the original key pool is divides into many smaller pools, each of which is associated to different group. This group-based deployment model was further developed in Bag and Roy (2013) and Lee and Kwon (2014). Although these schemes can gain substantial improvement over exiting schemes that do not exploit deployment, they are only suitable to scenarios where deployment knowledge can be explored and this kind of information is not available in a generic deployment scenario.…”
Section: Related Workmentioning
confidence: 99%
“…Hence, we introduce the concept of network connectivity by taking the environment factors into account. In fact, some key management protocols [19][20][21] based on location need to consider the network density at the beginning of design. Therefore whether two nodes can establish a secure link will depend on two conditions:…”
Section: Optimal Connectivitymentioning
confidence: 99%
“…In order to optimize the performance of the Forwarding Free-rider-based location management scheme, a mathematical analysis model based on the Markov Chain is developed by adopting the Stochastic Petri Net to estimate the communication cost. The estimated results of their efficiency can get to know the advantages of the location management scheme of the multi-points routing and the features of the Gossip-based broadcast and its simulated results show that the Forwarding Free-rider-based location management scheme is superior to other location management schemes [15].…”
Section: Introductionmentioning
confidence: 99%