Self-Healing Key Distribution Schemes for Wireless Networks: A Survey
The objective of self-healing key distribution is to enable group users to recover session keys by themselves, without requesting additional transmissions from the group manager (GM), even when they miss some broadcast messages. One major benefit of the self-healing key distribution mechanism is the...
| Main Authors: | Tian, Biming, Han, Song, Parvin, Sazia, Hu, J., Das, S. |
|---|---|
| Format: | Journal Article |
| Published: |
Oxford University Press
2011
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/27948 |
Similar Items
Generalized hash-binary-tree based self-healing key distribution with implicit authentication
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks
by: Han, Song, et al.
Published: (2009)
by: Han, Song, et al.
Published: (2009)
A self-healing and mutual-healing key distribution scheme using bilinear pairings for wireless networks
by: Tian, Biming, et al.
Published: (2008)
by: Tian, Biming, et al.
Published: (2008)
A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks
by: Tian, Biming, et al.
Published: (2010)
by: Tian, Biming, et al.
Published: (2010)
A Secure Key Management Model for Wireless Mesh Networks
by: Gao, Li, et al.
Published: (2010)
by: Gao, Li, et al.
Published: (2010)
A key management scheme for heterogeneous sensor networks using keyed-hash chain
by: Tian, Biming, et al.
Published: (2009)
by: Tian, Biming, et al.
Published: (2009)
An efficient self-healing key distribution scheme
by: Tian, Biming, et al.
Published: (2008)
by: Tian, Biming, et al.
Published: (2008)
Towards enhanced key management in multi-phase ZigBee network architecture
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
Key management for wireless sensor network security
by: Tian, Biming
Published: (2011)
by: Tian, Biming
Published: (2011)
Chaotic map based key agreement with/out clock synchronization
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Taxonomy of attacks on wireless sensor networks
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Danger theory based node replication attack detection and mitigation in cluster mobile wireless sensor nodes
by: Shaukat, Haafizah Rameeza
Published: (2014)
by: Shaukat, Haafizah Rameeza
Published: (2014)
Wireless Multimedia Sensor Networks Applications and Security Challenges
by: Harjito, Bambang, et al.
Published: (2010)
by: Harjito, Bambang, et al.
Published: (2010)
Energy trust system for detecting sybil attacks in clustered wireless sensor network
by: Hussein, Noor Sabeeh
Published: (2016)
by: Hussein, Noor Sabeeh
Published: (2016)
Performance analysis on detection and prevention of wormhole attack in wireless network
by: Apandi, Mohamad Aiman Hanif
Published: (2019)
by: Apandi, Mohamad Aiman Hanif
Published: (2019)
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008)
by: Syamsuddin, I, et al.
Published: (2008)
Wireless sensor nodes deployment using multi-robot based on improved spanning tree algorithm
by: Arezoumand, Reza
Published: (2015)
by: Arezoumand, Reza
Published: (2015)
Highly efficient distance-based anomaly detection through univariate with PCA in wireless sensor networks
by: Xie, Miao, et al.
Published: (2011)
by: Xie, Miao, et al.
Published: (2011)
Mitigating malicious nodes using trust and reputation based model in wireless sensor networks
by: Abdullah, Muhammad Daniel Hafiz
Published: (2018)
by: Abdullah, Muhammad Daniel Hafiz
Published: (2018)
Secure web services using two-way authentication and three-party key establishment for service delivery
by: Han, Song, et al.
Published: (2009)
by: Han, Song, et al.
Published: (2009)
New proxy signatures with message recovery using pairing
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Efficient node cooperation stimulation mechanism in wireless multihop networks
by: Samian, Normalia
Published: (2017)
by: Samian, Normalia
Published: (2017)
Evaluation of wireless home automation technologies
by: Rathnayaka, Dinusha, et al.
Published: (2011)
by: Rathnayaka, Dinusha, et al.
Published: (2011)
Search algorithms for path planning problems in harsh wireless sensor network environment
by: Hong, Siaw Swin
Published: (2017)
by: Hong, Siaw Swin
Published: (2017)
Efficient back-off mechanism for IEEE 802.15.4 wireless sensor networks
by: Qadawi, Zahraa D.A.
Published: (2013)
by: Qadawi, Zahraa D.A.
Published: (2013)
A new proxy signature scheme as secure as EIGamal signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Pairing-based public-key encryption schemes with backward-and-forward security
by: Han, Song, et al.
Published: (2008)
by: Han, Song, et al.
Published: (2008)
Energy-efficient medium access control strategy for cooperative wireless networks
by: Sami, Mahmoud
Published: (2016)
by: Sami, Mahmoud
Published: (2016)
Bandwidth Enhancement of Microstrip Antenna for Wireless Local Area Network Applications
by: Doraisingam, Yoharaaj
Published: (2007)
by: Doraisingam, Yoharaaj
Published: (2007)
An architecture framework for enhanced wireless sensor network security
by: Radmand, Pedram
Published: (2012)
by: Radmand, Pedram
Published: (2012)
An intrusion tolerant system architecture for secure and self-healing smart grid control centers
by: Tanha, Maryam
Published: (2013)
by: Tanha, Maryam
Published: (2013)
A study of interference between bluetooth and 802.11b (WIFI) / Mazani Manaf, Md Jamil Abu Sari and Jamaludin Md Yusof
by: Manaf, Mazani, et al.
Published: (2005)
by: Manaf, Mazani, et al.
Published: (2005)
Lightweight verification and fine-grained access control in named data networking based on schnorr signature and hash functions
by: Wu, Shanglun, et al.
Published: (2021)
by: Wu, Shanglun, et al.
Published: (2021)
Strength recovery and healing efficiency of cement-based materials containing autogenous healing binders and autonomous encapsulated healing agents
by: Mohammed, Abdulmohaimen Imad
Published: (2021)
by: Mohammed, Abdulmohaimen Imad
Published: (2021)
Secure geographic forwarding protocols for wireless sensor networks
by: Adnan, Ali Idarous
Published: (2017)
by: Adnan, Ali Idarous
Published: (2017)
Encapsulated healing agents for asphalt self-healing
by: Al-Mansoori, Tariq Hussein Abees
Published: (2018)
by: Al-Mansoori, Tariq Hussein Abees
Published: (2018)
Channel assignment and congestion control in multi-radio multi-channel wireless mesh networks
by: Musaddiq, Arslan
Published: (2015)
by: Musaddiq, Arslan
Published: (2015)
Highly efficient magnetic resonance coupling wireless power transfer for 5G applications
by: Kamarudin, Saidatul Izyanie
Published: (2021)
by: Kamarudin, Saidatul Izyanie
Published: (2021)
Advanced Multiple Access Schemes for Multimedia Traffic over Wireless Channels
by: Habaebi, Mohamed Hadi
Published: (2001)
by: Habaebi, Mohamed Hadi
Published: (2001)
Digital signature-based secure communication in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)
by: Parvin, Sazia, et al.
Published: (2011)
Similar Items
-
Generalized hash-binary-tree based self-healing key distribution with implicit authentication
by: Tian, Biming, et al.
Published: (2011) -
Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks
by: Han, Song, et al.
Published: (2009) -
A self-healing and mutual-healing key distribution scheme using bilinear pairings for wireless networks
by: Tian, Biming, et al.
Published: (2008) -
A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks
by: Tian, Biming, et al.
Published: (2010) -
A Secure Key Management Model for Wireless Mesh Networks
by: Gao, Li, et al.
Published: (2010)