A key management scheme for heterogeneous sensor networks using keyed-hash chain
We present a suite of key management scheme for heterogeneous sensor networks. In view of different types of communications, a single key can not satisfy various communication requirements. It is necessary to study the establishment and renewal of different types of keys in heterogeneous sensornetwo...
| Main Authors: | Tian, Biming, Han, Song, Dillon, Tharam S. |
|---|---|
| Other Authors: | Xiaohua Jia |
| Format: | Conference Paper |
| Published: |
IEEE
2009
|
| Subjects: | |
| Online Access: | http://doi.ieeecomputersociety.org/10.1109/MSN.2009.26 http://hdl.handle.net/20.500.11937/19017 |
Similar Items
A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks
by: Tian, Biming, et al.
Published: (2010)
by: Tian, Biming, et al.
Published: (2010)
Generalized hash-binary-tree based self-healing key distribution with implicit authentication
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
An efficient self-healing key distribution scheme
by: Tian, Biming, et al.
Published: (2008)
by: Tian, Biming, et al.
Published: (2008)
Self-Healing Key Distribution Schemes for Wireless Networks: A Survey
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
A self-healing and mutual-healing key distribution scheme using bilinear pairings for wireless networks
by: Tian, Biming, et al.
Published: (2008)
by: Tian, Biming, et al.
Published: (2008)
Key management for wireless sensor network security
by: Tian, Biming
Published: (2011)
by: Tian, Biming
Published: (2011)
Towards enhanced key management in multi-phase ZigBee network architecture
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
A Secure Key Management Model for Wireless Mesh Networks
by: Gao, Li, et al.
Published: (2010)
by: Gao, Li, et al.
Published: (2010)
Chaotic map based key agreement with/out clock synchronization
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Secure web services using two-way authentication and three-party key establishment for service delivery
by: Han, Song, et al.
Published: (2009)
by: Han, Song, et al.
Published: (2009)
Pairing-based public-key encryption schemes with backward-and-forward security
by: Han, Song, et al.
Published: (2008)
by: Han, Song, et al.
Published: (2008)
An improved public key cryptography based on the elliptic curve
by: Al-Daoud, Essam Faleh
Published: (2002)
by: Al-Daoud, Essam Faleh
Published: (2002)
Key Success and Failure Paths in Fashion Marketing Strategies
by: Woodside, Arch
Published: (2010)
by: Woodside, Arch
Published: (2010)
Alternative discrete variable protocol for point to point Quantum Key Distribution system
by: Ahmad Ghazali, Lizal Iswady
Published: (2012)
by: Ahmad Ghazali, Lizal Iswady
Published: (2012)
Quantum key distribution protocols in transmission control protocol
by: Kamarul Aizan, Nur Hanani
Published: (2012)
by: Kamarul Aizan, Nur Hanani
Published: (2012)
A taxonomic overview and key to the ants of Barrow Island, Western Australia
by: Heterick, Brian E.
Published: (2013)
by: Heterick, Brian E.
Published: (2013)
Improved security of Rijndael key expansion function
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017)
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017)
A palaeomagnetic and 40Ar/39Ar study of mafic dykes in southern Sweden: A new Early Neoproterozoic key-pole for the Baltic Shield and implications for Sveconorwegian and Grenville loops
by: Elming, S., et al.
Published: (2014)
by: Elming, S., et al.
Published: (2014)
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008)
by: Syamsuddin, I, et al.
Published: (2008)
Effect of gamma-gamma distribution on performance of optical differential 8-level phase shift keying in free space optical communication
by: Boroon, Mohammad
Published: (2016)
by: Boroon, Mohammad
Published: (2016)
A New "F-Lueg" Cryptosystem and its Security
by: Choo, Mun Yoong
Published: (2002)
by: Choo, Mun Yoong
Published: (2002)
Sistem Kripto Luc Untuk Pengesahan Aplikasi Telnet
by: Sibo, Siti Jauyah
Published: (1999)
by: Sibo, Siti Jauyah
Published: (1999)
Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)
A Case Study on Key Account Management at Printo
by: Palanivelu, Anand Raj
Published: (2011)
by: Palanivelu, Anand Raj
Published: (2011)
New directions in forging multivariate signature schemes
by: Abdul Jamal, Nurul Amiera Sakinah
Published: (2023)
by: Abdul Jamal, Nurul Amiera Sakinah
Published: (2023)
An investigation of mathematics teachers' beliefs and practices following a professional development intervention based on constructivist principles
by: Stoker, John
Published: (2003)
by: Stoker, John
Published: (2003)
Cryptanalysis of RSA and its variants using continuous midpoint subdivision analysis and lattices
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021)
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021)
Frequency as a key parameter in discriminating the failure types of thermal barrier coatings: Cluster analysis of acoustic emission signals
by: Yang, L., et al.
Published: (2015)
by: Yang, L., et al.
Published: (2015)
Experimental and Computaional Study of Compartmented Fluidized Bed Gasifier (CFBG)
by: Wee, Siaw, et al.
Published: (2008)
by: Wee, Siaw, et al.
Published: (2008)
A self-healing key distribution scheme based on vector space secret sharing and one way hash chains
by: Tian, Biming, et al.
Published: (2008)
by: Tian, Biming, et al.
Published: (2008)
A revision of the ant genus Probolomyrmex (Hymenoptera: Formicidae: Proceratiinae) in Australia and Melanesia
by: Shattuck, S., et al.
Published: (2012)
by: Shattuck, S., et al.
Published: (2012)
Investigating the key attributes to enhance students' learning experience in 21st century class environment
by: Leow, Fui-Theng, et al.
Published: (2016)
by: Leow, Fui-Theng, et al.
Published: (2016)
Compartmented Fluidized Bed Gasifier For Syngas and Power Generation Using Biomass?, :
by: Chok, Vui, et al.
Published: (2008)
by: Chok, Vui, et al.
Published: (2008)
Demand for Reinsurance in UK property-casualty insurance industry
by: WU, RENFENG
Published: (2011)
by: WU, RENFENG
Published: (2011)
Determinants of Shareholder Value in China's Banking Sector
by: LI, Zhuoyang
Published: (2016)
by: LI, Zhuoyang
Published: (2016)
The Macroeconomic Determinants of Loan Loss Provision in Chinese Banks
by: Li, Zhen
Published: (2017)
by: Li, Zhen
Published: (2017)
An improved binary method for scalar multiplication in elliptic curve cryptography
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
Green infrastructure practice and a sustainability key performance indicators framework for neighbourhood-level construction of sponge city programme
by: Sun, Jing, et al.
Published: (2020)
by: Sun, Jing, et al.
Published: (2020)
Lightweight verification and fine-grained access control in named data networking based on schnorr signature and hash functions
by: Wu, Shanglun, et al.
Published: (2021)
by: Wu, Shanglun, et al.
Published: (2021)
Digital signature-based secure communication in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)
by: Parvin, Sazia, et al.
Published: (2011)
Similar Items
-
A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks
by: Tian, Biming, et al.
Published: (2010) -
Generalized hash-binary-tree based self-healing key distribution with implicit authentication
by: Tian, Biming, et al.
Published: (2011) -
An efficient self-healing key distribution scheme
by: Tian, Biming, et al.
Published: (2008) -
Self-Healing Key Distribution Schemes for Wireless Networks: A Survey
by: Tian, Biming, et al.
Published: (2011) -
A self-healing and mutual-healing key distribution scheme using bilinear pairings for wireless networks
by: Tian, Biming, et al.
Published: (2008)