Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Denial of Service in Sensor Networks
Computer
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Combinatorial Optimization of Group Key Management
Journal of Network and Systems Management
Training a wireless sensor network
Mobile Networks and Applications
Key management for long-lived sensor networks in hostile environments
Computer Communications
Scalable and efficient key management for heterogeneous sensor networks
The Journal of Supercomputing
Attack-resilient random key distribution scheme for distributed sensor networks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
A key distribution scheme preventing collusion attacks in ubiquitous heterogeneous sensor networks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
A forward authentication key management scheme for heterogeneous sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
A key management scheme for cross-layering designs in wireless sensor networks
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
Hi-index | 0.00 |
We propose a scalable key management scheme forsensor networks consisting of a large-scale randomdeployment of commodity sensor nodes that areanonymous. The proposed scheme relies on a location-basedvirtual network infrastructure and is built upona combinatorial formulation of the group keymanagement problem. Primary features of our schemeinclude autonomously computing group keys, anddynamically computing, using a simple hash function,the mapping of nodes to group keys. The scheme scaleswell in the size of the network and supports dynamicsetup and management of arbitrary structures ofsecure group communications in large-scale wirelesssensor network.