2008
DOI: 10.1007/s11227-008-0184-2
|View full text |Cite
|
Sign up to set email alerts
|

Scalable and efficient key management for heterogeneous sensor networks

Abstract: As typical wireless sensor networks (WSNs) have resource limitations, predistribution of secret keys is possibly the most practical approach for secure network communications. In this paper, we propose a key management scheme based on random key predistribution for heterogeneous wireless sensor networks (HSNs). As large-scale homogeneous networks suffer from high costs of communication, computation, and storage requirements, the HSNs are preferred because they provide better performance and security solutions … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
42
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 47 publications
(42 citation statements)
references
References 25 publications
0
42
0
Order By: Relevance
“…All the CHs can broadcast a hello message within a large range area, so that all the lower nodes can choose a proper CH as its CH and key distribution center (KDC) by the best received signal strength indicator (RSSI) [11] . In our model, the best signal represents the shortest straight distance between any pair of nodes.…”
Section: Network Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…All the CHs can broadcast a hello message within a large range area, so that all the lower nodes can choose a proper CH as its CH and key distribution center (KDC) by the best received signal strength indicator (RSSI) [11] . In our model, the best signal represents the shortest straight distance between any pair of nodes.…”
Section: Network Modelmentioning
confidence: 99%
“…(2) Each sensor node, from upper level to lower level (i.e., n k i,j , for k = 2 to L), carries out the following steps: chooses a higher sensor node as its KDC based on the best RSSI [11] ; broadcasts its hello message together with the MAC authentication; collects its neighboring list NL(n k i,j ). (3) Each sensor node, from lower level to higher level (i.e., n k i,j , for k = L down to 2), carries out the following steps: updates its master key K m = H(K I , r i ); transmits its ID and neighboring list together with the MAC to its KDC.…”
Section: Key Distribution Phasementioning
confidence: 99%
See 1 more Smart Citation
“…Recently, two keyed-hash chain based key predistribution schemes [13] [14] were proposed. Instead of generating a large key pool of random keys, a key pool is represented by a small number of generation keys.…”
Section: Related Workmentioning
confidence: 99%
“…The scheme uses keyed-hash chain to reduce storage overhead. Different from the existing keyedhash chain based schemes [13] [14], sensor nodes only store commitments for the corresponding key chains. This scheme is resilient to node capture attack in this way.…”
Section: Introductionmentioning
confidence: 99%