A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Key distribution techniques for sensor networks
Wireless sensor networks
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
On the Distribution and Revocation of Cryptographic Keys in Sensor Networks
IEEE Transactions on Dependable and Secure Computing
Security Issues in Wireless Sensor Networks
ICSNC '06 Proceedings of the International Conference on Systems and Networks Communication
Online data storage using implicit security
Information Sciences: an International Journal
Sensor network security: a survey
IEEE Communications Surveys & Tutorials
IEEE Communications Magazine
Space efficient secret sharing for implicit data security
Information Sciences: an International Journal
Hi-index | 0.00 |
Wireless Sensor Network (WSN) is a noticeable subject currently. There are many WSN applications including military control and environmental monitoring. In these applications, the security of data transmission is an important issue. Because sensor nodes are resource limited and they do not have fixed structure model, there needs an efficiently key distribution and management mechanisms to achieve secure communication. This paper proposes a scheme which uses an implicit security technique to distribute the encrypted key. Because most of operations are computed by the base station, this scheme can extend survival time of the network and it is very appropriate for WSN.