On key distribution and authentication in mobile radio networks
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Key Establishment Protocols for Secure Mobile Communications: A Selective Survey
ACISP '98 Proceedings of the Third Australasian Conference on Information Security and Privacy
Key Distribution Protocol for Digital Mobile Communication Systems
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge
IEEE Transactions on Dependable and Secure Computing
New directions in cryptography
IEEE Transactions on Information Theory
IEEE Communications Magazine
Kerberos: an authentication service for computer networks
IEEE Communications Magazine
Hi-index | 0.00 |
Wireless sensor network (WSN) consists of large number of sensor nodes, which may be deployed in hostile environment. Hence, to provide security, the communication among sensor node is to be protected using encryption. Because of the resource constrained nature of the sensor nodes special mechanism is needed for the management of cryptographic keys in WSN. A hexagonal group based deployment model which makes use of 'q' composite random key pre-distribution scheme is suggested. This method makes use of deployment knowledge which is available prior to the network deployment. The keys are distributed among the nodes of sensor network in such a way that, only the nodes in same or adjacent deployment groups share the key, since they are more probable to be neighbors. This key distribution improves the network's connectivity, memory usage, and network resilience against node capture.