Artificial intelligence: a new synthesis
Artificial intelligence: a new synthesis
Wireless integrated network sensors
Communications of the ACM
Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Denial of Service in Sensor Networks
Computer
Design Space Exploration for Energy-Efficient Secure Sensor Network
ASAP '02 Proceedings of the IEEE International Conference on Application-Specific Systems, Architectures, and Processors
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Energy-Aware Routing in Cluster-Based Sensor Networks
MASCOTS '02 Proceedings of the 10th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems
Efficient Security Mechanisms for the Distributed Wireless Sensor Networks
ICITA '05 Proceedings of the Third International Conference on Information Technology and Applications (ICITA'05) Volume 2 - Volume 02
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
ACM Transactions on Sensor Networks (TOSN)
Group key management scheme for large-scale sensor networks
Ad Hoc Networks
Routing techniques in wireless sensor networks: a survey
IEEE Wireless Communications
IEEE Communications Magazine
Adaptive clustering for mobile wireless networks
IEEE Journal on Selected Areas in Communications
Review: Dynamic key management in wireless sensor networks: A survey
Journal of Network and Computer Applications
Hi-index | 0.24 |
The application of wireless sensor networks to areas such as combat field surveillance, terrorist tracking and highway traffic monitoring requires secure communication among the sensor nodes within the networks. Logical key hierarchy (LKH) is a tree-based key management model which provides secure group communication. When a sensor node is added or evicted from the communication group, LKH updates the group key in order to ensure the security of the communications. In order to efficiently update the group key, we propose an A^*-based key tree structure, an extension to LKH, that reduces the number of re-key messages by considering the addition and eviction ratios of the history data. For the generation of the proposed key tree structure the A^* algorithm is applied, in which the branching factor at each level can take on different value. The experimental results demonstrate the efficiency of the proposed key tree structure against the existing key tree structures of fixed branching factors.