A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks
The security of Wireless Sensor Networks (WSNs) has a direct reliance on secure and efficient key management. This leaves key management as a fundamental research topic in the field of WSNs security. Among the proposed key management schemes for WSNs security, LEAP (Localized Encryption and Authenti...
| Main Authors: | Tian, Biming, Han, Song, Parvin, Sazia, Dillon, Tharam S. |
|---|---|
| Other Authors: | Jiannong Cao |
| Format: | Conference Paper |
| Published: |
IEEE
2010
|
| Subjects: | |
| Online Access: | http://doi.ieeecomputersociety.org/10.1109/EUC.2010.99 http://hdl.handle.net/20.500.11937/42092 |
Similar Items
A key management scheme for heterogeneous sensor networks using keyed-hash chain
by: Tian, Biming, et al.
Published: (2009)
by: Tian, Biming, et al.
Published: (2009)
Towards enhanced key management in multi-phase ZigBee network architecture
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
Key management for wireless sensor network security
by: Tian, Biming
Published: (2011)
by: Tian, Biming
Published: (2011)
A Secure Key Management Model for Wireless Mesh Networks
by: Gao, Li, et al.
Published: (2010)
by: Gao, Li, et al.
Published: (2010)
Self-Healing Key Distribution Schemes for Wireless Networks: A Survey
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
A self-healing and mutual-healing key distribution scheme using bilinear pairings for wireless networks
by: Tian, Biming, et al.
Published: (2008)
by: Tian, Biming, et al.
Published: (2008)
An efficient self-healing key distribution scheme
by: Tian, Biming, et al.
Published: (2008)
by: Tian, Biming, et al.
Published: (2008)
Generalized hash-binary-tree based self-healing key distribution with implicit authentication
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
Secure web services using two-way authentication and three-party key establishment for service delivery
by: Han, Song, et al.
Published: (2009)
by: Han, Song, et al.
Published: (2009)
Taxonomy of attacks on wireless sensor networks
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Highly efficient distance-based anomaly detection through univariate with PCA in wireless sensor networks
by: Xie, Miao, et al.
Published: (2011)
by: Xie, Miao, et al.
Published: (2011)
Secure geographic forwarding protocols for wireless sensor networks
by: Adnan, Ali Idarous
Published: (2017)
by: Adnan, Ali Idarous
Published: (2017)
Pairing-based public-key encryption schemes with backward-and-forward security
by: Han, Song, et al.
Published: (2008)
by: Han, Song, et al.
Published: (2008)
Energy-efficient two-stage chain protocol routing algorithm for wireless sensor networks
by: Farhan, Husam Kareem
Published: (2014)
by: Farhan, Husam Kareem
Published: (2014)
Alternative discrete variable protocol for point to point Quantum Key Distribution system
by: Ahmad Ghazali, Lizal Iswady
Published: (2012)
by: Ahmad Ghazali, Lizal Iswady
Published: (2012)
An improved public key cryptography based on the elliptic curve
by: Al-Daoud, Essam Faleh
Published: (2002)
by: Al-Daoud, Essam Faleh
Published: (2002)
Wireless Multimedia Sensor Networks Applications and Security Challenges
by: Harjito, Bambang, et al.
Published: (2010)
by: Harjito, Bambang, et al.
Published: (2010)
Totally opportunistic routing algorithm for underwater wireless sensor network
by: Rahman, Ziaur
Published: (2019)
by: Rahman, Ziaur
Published: (2019)
A Grid-Based Reliable Routing (GBRR) protocol for wireless sensor networks
by: Jiang, Cailing
Published: (2019)
by: Jiang, Cailing
Published: (2019)
Search algorithms for path planning problems in harsh wireless sensor network environment
by: Hong, Siaw Swin
Published: (2017)
by: Hong, Siaw Swin
Published: (2017)
Efficient back-off mechanism for IEEE 802.15.4 wireless sensor networks
by: Qadawi, Zahraa D.A.
Published: (2013)
by: Qadawi, Zahraa D.A.
Published: (2013)
Quantum key distribution protocols in transmission control protocol
by: Kamarul Aizan, Nur Hanani
Published: (2012)
by: Kamarul Aizan, Nur Hanani
Published: (2012)
SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing
by: Abd, Wamidh Jwdat
Published: (2019)
by: Abd, Wamidh Jwdat
Published: (2019)
Stability improvement low energy adaptive clustering hierarchy routing (sileach) protocol for wireless sensor network
by: Jasim, Al-Haddad Zaid Ali
Published: (2017)
by: Jasim, Al-Haddad Zaid Ali
Published: (2017)
Factor-based LEACH (FLEACH) protocol for extending Wireless Sensor Networks' lifetime
by: Ahmed, Amodu Oluwatosin
Published: (2016)
by: Ahmed, Amodu Oluwatosin
Published: (2016)
Industrial IT revolution through wireless sensor network technologies
by: Petersen, S., et al.
Published: (2008)
by: Petersen, S., et al.
Published: (2008)
A proactive energy awareness traffic routing for wireless sensor networks against energy sink-holes
by: Mustafa, Mayada Salih Abdalla
Published: (2019)
by: Mustafa, Mayada Salih Abdalla
Published: (2019)
Mitigating malicious nodes using trust and reputation based model in wireless sensor networks
by: Abdullah, Muhammad Daniel Hafiz
Published: (2018)
by: Abdullah, Muhammad Daniel Hafiz
Published: (2018)
Trade-off between energy efficiency and collisions for MAC protocols of wireless sensor network
by: Jahan, Mohammad Saukat
Published: (2015)
by: Jahan, Mohammad Saukat
Published: (2015)
Enhanced Medium Access Control Protocol for Resolving Node Misbehavior in Wireless Networks
by: Nordin, Noorsalwati
Published: (2007)
by: Nordin, Noorsalwati
Published: (2007)
Watermarking technique for wireless multimedia sensor networks: A state of the art
by: Potdar, Vidyasagar, et al.
Published: (2012)
by: Potdar, Vidyasagar, et al.
Published: (2012)
Traffic Adaptive Schedule-Based Mac Protocol For Wireless sensor Networks
by: Vahabi, Maryam
Published: (2008)
by: Vahabi, Maryam
Published: (2008)
Digital signature-based secure communication in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)
by: Parvin, Sazia, et al.
Published: (2011)
Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks
by: Han, Song, et al.
Published: (2009)
by: Han, Song, et al.
Published: (2009)
Secure Communication in Wireless Multimedia Sensor Networks using Watermarking
by: Harjito, Bambang, et al.
Published: (2010)
by: Harjito, Bambang, et al.
Published: (2010)
Dynamic area coverage algorithms for static and mobile wireless sensor network environments using voronoi techniques
by: Ceesay, Omar M.
Published: (2011)
by: Ceesay, Omar M.
Published: (2011)
Wireless Sensor Network Transport Protocol - A State of the Art
by: Rathnayaka, Dinusha, et al.
Published: (2010)
by: Rathnayaka, Dinusha, et al.
Published: (2010)
Key Success and Failure Paths in Fashion Marketing Strategies
by: Woodside, Arch
Published: (2010)
by: Woodside, Arch
Published: (2010)
Performance analysis on detection and prevention of wormhole attack in wireless network
by: Apandi, Mohamad Aiman Hanif
Published: (2019)
by: Apandi, Mohamad Aiman Hanif
Published: (2019)
A mutual-healing key distribution scheme in wireless sensor networks
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
Similar Items
-
A key management scheme for heterogeneous sensor networks using keyed-hash chain
by: Tian, Biming, et al.
Published: (2009) -
Towards enhanced key management in multi-phase ZigBee network architecture
by: Tian, Biming, et al.
Published: (2011) -
Key management for wireless sensor network security
by: Tian, Biming
Published: (2011) -
A Secure Key Management Model for Wireless Mesh Networks
by: Gao, Li, et al.
Published: (2010) -
Self-Healing Key Distribution Schemes for Wireless Networks: A Survey
by: Tian, Biming, et al.
Published: (2011)