An optimal class of symmetric key generation systems
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
A pairwise key predistribution scheme for wireless sensor networks
ACM Transactions on Information and System Security (TISSEC)
Wireless Sensor Networks: To Cluster or Not To Cluster?
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
An efficient key pre-distribution scheme for secure distributed sensor networks
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Loop-Based topology maintenance in wireless sensor networks
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
A survey on key management mechanisms for distributed Wireless Sensor Networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
Wireless sensor networks are emerging as a promising solution for various types of futuristic applications for both military and the public. The design of key management schemes is one of the most important aspects and basic research field of secure wireless sensor networks. Efficient key management could guarantee authenticity and confidentiality of the data exchanged among the nodes in the network. In this paper, we propose a new key management scheme based on loop topology. Comparing with clusterbased key management schemes, loop-based scheme is proved to be more efficient, cost-saving and safe.