2015
DOI: 10.1049/el.2014.3327
|View full text |Cite
|
Sign up to set email alerts
|

Key renewal scheme with sensor authentication under clustered wireless sensor networks

Abstract: In wireless sensor networks, the clustering routing protocol is commonly used for energy efficiency. However, routing protocols without proper security suffer from many security vulnerabilities. Hence, a key renewal scheme based on the clustering routing protocol is proposed. To apply the key renewal scheme with sensor authentication, sensor nodes are first authenticated during the key establishment procedure and then the symmetric key is updated periodically using hash functions. The simulation results show t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
20
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(20 citation statements)
references
References 4 publications
0
20
0
Order By: Relevance
“…Even when an attacker is able to obtain kg,pb, he/she will not be able to determine kg,pr from kg,pb because that is an integer factorization problem [5]. Meanwhile, (dj i , Qj i ) are ephemeral keys and CHj replaces them with (dj i+1 , Qj i+1 ) at the end of the ith session.…”
Section: Qj Imentioning
confidence: 99%
See 2 more Smart Citations
“…Even when an attacker is able to obtain kg,pb, he/she will not be able to determine kg,pr from kg,pb because that is an integer factorization problem [5]. Meanwhile, (dj i , Qj i ) are ephemeral keys and CHj replaces them with (dj i+1 , Qj i+1 ) at the end of the ith session.…”
Section: Qj Imentioning
confidence: 99%
“…Lee and Kim [5] proposed a session key establishment scheme based on DiffieHellman key exchange (DHKE) [6] for hierarchical sensor networks that operates as illustrated in Fig. 1.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The aim of the node scheduling is to save the node energy and prolong the network lifetime with the desired QoC by shutting down the nodes in turn. Currently, most coverage control algorithms obtain the coverage information according to the location information of the nodes [4][5][6]. However, the acquisition of location information relies on external infrastructures such as the GPS and directional antennas, which greatly increases the hardware cost and energy consumption for the nodes.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, for easy network management, such applications can employ clustered and hierarchical sensor networks, as shown in Figure 1 [19,20]. When employing clustered sensor networks for such applications, the communication between the gateway and the cluster head requires stronger security than the communication between the cluster head and the sensor node; this is because the cluster head collects the data sensed by sensor nodes in its cluster and transmits it to the gateway [17]. Therefore, it is appropriate to apply the session key to the communication between the gateway and the cluster head in order to increase security.…”
Section: Introductionmentioning
confidence: 99%