Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
Password authentication with insecure communication
Communications of the ACM
Key Establishment in Large Dynamic Groups Using One-Way Function Trees
IEEE Transactions on Software Engineering
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
Combinatorial Optimization of Group Key Management
Journal of Network and Systems Management
Establishing pairwise keys in distributed sensor networks
ACM Transactions on Information and System Security (TISSEC)
Efficient Group Key Management Protocol with One-Way Key Derivation
LCN '05 Proceedings of the The IEEE Conference on Local Computer Networks 30th Anniversary
A Level Key Infrastructure for Secure and Efficient Group Communication in Wireless Sensor Network
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
Dynamic combinatorial key management scheme for sensor networks: Research Articles
Wireless Communications & Mobile Computing - Wireless Ad Hoc Networks: Technologies and Challenges
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
ACM Transactions on Sensor Networks (TOSN)
Mobile Networks and Applications
Elliptic curve cryptography-based access control in sensor networks
International Journal of Security and Networks
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Distributed Intrusion Detection Systems for Enhancing Security in Mobile Wireless Sensor Networks
International Journal of Distributed Sensor Networks - Advances on Heterogeneous Wireless Sensor Networks
Group-based intrusion detection system in wireless sensor networks
Computer Communications
Group key management scheme for large-scale sensor networks
Ad Hoc Networks
Topological Key Hierarchy for Energy-Efficient Group Key Management in Wireless Sensor Networks
Wireless Personal Communications: An International Journal
A survey on secure multipath routing protocols in WSNs
Computer Networks: The International Journal of Computer and Telecommunications Networking
Elliptic curve cryptography: survey and its security applications
ACAI '11 Proceedings of the International Conference on Advances in Computing and Artificial Intelligence
LARK: A Lightweight Authenticated ReKeying Scheme for Clustered Wireless Sensor Networks
ACM Transactions on Embedded Computing Systems (TECS)
Personal and Ubiquitous Computing
Neighbourhood monitoring for decentralised coordination in multi-agent systems: A case-study
ISCC '11 Proceedings of the 2011 IEEE Symposium on Computers and Communications
IEEE Wireless Communications
Intrusion detection techniques in mobile ad hoc and wireless sensor networks
IEEE Wireless Communications
Autonomous Shared Key Management Scheme for Space Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Secure group communication is a paradigm that primarily designates one-to-many communication security. The proposed works relevant to secure group communication have predominantly considered the whole network as being a single group managed by a central powerful node capable of supporting heavy communication, computation and storage cost. However, a typical Wireless Sensor Network (WSN) may contain several groups, and each one is maintained by a sensor node (the group controller) with constrained resources. Moreover, the previously proposed schemes require a multicast routing support to deliver the rekeying messages. Nevertheless, multicast routing can incur heavy storage and communication overheads in the case of a wireless sensor network. Due to these two major limitations, we have reckoned it necessary to propose a new secure group communication with a lightweight rekeying process. Our proposal overcomes the two limitations mentioned above, and can be applied to a homogeneous WSN with resource-constrained nodes with no need for a multicast routing support. Actually, the analysis and simulation results have clearly demonstrated that our scheme outperforms the previous well-known solutions.