An optimal class of symmetric key generation systems
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
On the Distribution and Revocation of Cryptographic Keys in Sensor Networks
IEEE Transactions on Dependable and Secure Computing
A secure and scalable Group Key Exchange system
Information Processing Letters
A key establishment scheme for large-scale mobile wireless sensor networks
ICDCIT'07 Proceedings of the 4th international conference on Distributed computing and internet technology
IEEE Communications Magazine
Hi-index | 0.00 |
A distributed key management scheme and the robust continuity of group key establishment are realized in this paper. This scheme derives the concept of seed members who are responsible for the management of users' joining and revocation operations by using secret sharing techniques and Modified Blom's symmetric key establishment mechanism. Besides, a novel seed member alternation mechanism which can efficiently resist of node capture attacks and revocation attacks leaves the resources much more balanced among the sensor nodes to prolong the lifetime of WSNs. Finally, The key continuity enables all the sensors to establish and update both of the pair-wise key and group key with the same key pre-distribution information, which significantly decreases the resource consuming of key management in distributed sensor networks. By comparison, this scheme outperforms most of the existing schemes in terms of network security, key connectivity and complexity of storage as well as communication.