2013
DOI: 10.1504/ijcnds.2013.055514
|View full text |Cite
|
Sign up to set email alerts
|

Key establishment protocols for secure communication in clustered sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2016
2016

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…The scheme for pre-key distribution based on the prior deployment knowledge of the sensor nodes is discussed in [5]. New schemes for key management for confidential communication between node and its cluster head in hierarchical sensor networks is discussed in [1].These schemes exhibit better performance with some additional storage. Zia et al [6] have discussed secure triple-key management scheme.…”
Section: Literature Surveymentioning
confidence: 99%
“…The scheme for pre-key distribution based on the prior deployment knowledge of the sensor nodes is discussed in [5]. New schemes for key management for confidential communication between node and its cluster head in hierarchical sensor networks is discussed in [1].These schemes exhibit better performance with some additional storage. Zia et al [6] have discussed secure triple-key management scheme.…”
Section: Literature Surveymentioning
confidence: 99%
“…In [13], more complicated security designs are envisioned for secure sensor networks like non-group confidentiality (nodes outside cluster should not be able to decrypt messages within cluster), forward confidentiality (compromised nodes should not have keys to decrypt future messages) and backward confidentiality (new nodes should not have keys to decrypt previous messages). The paper assumes a safe period when secrets are established.…”
Section: A Rkp Based Schemesmentioning
confidence: 99%