2009
DOI: 10.4156/jcit.vol4.issue1.lin
|View full text |Cite
|
Sign up to set email alerts
|

High Effect Secure Data Transmission Mechanisms in Wireless Sensor Networks Using ID-Based Key Management Scheme

Abstract: This study presents an ID-based key management scheme that exploits an implied public key to address secure data transmissions for reducing required memory capacities and CPU computations in Wireless Sensor Networks (WSNs). In the proposed scheme, each sensor node only has to store a secret key for encrypting and aggregating data during transmissions. Furthermore, the system supports direct and aggregate data transmission modes that provide rapid and secure transmission methods without complex decryption and l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…Assigning ID number to nodes in wireless networks is also reported in [18], where secure data transmission scheme is based on ID, and the ID adopts symmetric key. As noticed, our method assigns an array to each node.…”
Section: Destination-oriented Routing With Traffic Prioritymentioning
confidence: 99%
See 1 more Smart Citation
“…Assigning ID number to nodes in wireless networks is also reported in [18], where secure data transmission scheme is based on ID, and the ID adopts symmetric key. As noticed, our method assigns an array to each node.…”
Section: Destination-oriented Routing With Traffic Prioritymentioning
confidence: 99%
“…And the array can be viewed as coordination, which is symmetric in each BS mesh in nature. As [18] mentioned symmetric ID is helpful to reduce CPU time, this may be result of ID coding simplicity and perfect symmetry properties.…”
Section: Destination-oriented Routing With Traffic Prioritymentioning
confidence: 99%
“…In the open environments, the communication channel in WSN can easily be manipulated by any malicious adversary. Security of wireless sensor networks is most essential [5][6][7][8]. One of the most important primitives for ensuring the security of WSN is authentication between the GWN and sensor nodes, between the GWN and users and between the sensor nodes and users [9].…”
Section: Introductionmentioning
confidence: 99%
“…In both of these scenarios, the sink cannot be located near the sensors. Thus, data from sensors are transmitted to a central location (sink) where efficient and complex analysis takes place, which is demand for such energy and bandwidth, because transmission energy scales as n d ( n typically 2 4 -, d transmission distance) and transmission is the largest consumer of energy in WSN [6](For the energy cost of transmitting 1kb over a distance of 100 meters, a general purpose processor with 100MIPS/W power could execute million instructions). Besides, centralized processing is too slow for application with low latency requirement and leaves most of the processing capability of sensors unutilized.…”
Section: Introductionmentioning
confidence: 99%