2011
DOI: 10.1109/tnsm.2011.072611.100080
|View full text |Cite
|
Sign up to set email alerts
|

Providing End-to-End Secure Communications in Wireless Sensor Networks

Abstract: Abstract-In many Wireless Sensor Networks (WSNs), providing end to end secure communications between sensors and the sink is important for secure network management. While there have been many works devoted to hop by hop secure communications, the issue of end to end secure communications is largely ignored. In this paper, we design an end to end secure communication protocol in randomly deployed WSNs. Specifically, our protocol is based on a methodology called differentiated key pre-distribution. The core ide… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(14 citation statements)
references
References 48 publications
0
14
0
Order By: Relevance
“…Wenjun Gu et al [20] have proposed an end-to-end secure communication protocol in randomly deployed WSNs based on differentiated key pre-distribution. This scheme distributes different number of keys to different sensors for increasing certain links resilience.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Wenjun Gu et al [20] have proposed an end-to-end secure communication protocol in randomly deployed WSNs based on differentiated key pre-distribution. This scheme distributes different number of keys to different sensors for increasing certain links resilience.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The performance of SAIRSR is compared with the LPN authentication scheme [10] and differentiated key management (DIFF-KEY) technique [20]. The performance is evaluated mainly, according to the following metrics.…”
Section: Performance Metricsmentioning
confidence: 99%
“…Wenjun Gu et al [7] have designed an end to end secure communication protocol in arbitrarily distributed WSNs. Their protocol is constructed on a method referred as differentiated key pre-distribution.…”
Section: Related Workmentioning
confidence: 99%
“…The recent wireless sensor network designed protocols aim at providing a secure wireless transmission through multi hop infrastructure [14]. These wireless sensor nodes form an alternative path for wireless transmission in a randomly deployed network.…”
Section: Introductionmentioning
confidence: 99%