A key-predistribution-based weakly connected dominating set for secure clustering in DSN
The intent of this paper is to propose an efficient approach of secure clustering in distributed sensor networks. The clusters or groups in the network are formed based on offline rank assignment and key-predistribution. Our approach uses the concept of weakly connected dominating set to reduce the...
| Main Authors: | Pathan, Al-Sakib Khan, Hong, Choong Seon |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Springer-Verlag, Berlin, Germany
2006
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/783/ http://irep.iium.edu.my/783/1/spathanHPCC.pdf |
Similar Items
Secure clustering in DSN with key predistribution and WCDS
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Weakly connected dominating set-based secure clustering and operation in distributed sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
An efficient public key based security architecture for wireless sensor networks
by: Haque, Md. Mokammel, et al.
Published: (2007)
by: Haque, Md. Mokammel, et al.
Published: (2007)
Securing U-Healthcare sensor networks using public key based scheme
by: Haque, Md. Mokammel, et al.
Published: (2008)
by: Haque, Md. Mokammel, et al.
Published: (2008)
A key management scheme with encoding and improved security for wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
S-PkSec: an asymmetric key based security management scheme for sensor network operation
by: Haque, Md. Mokammel, et al.
Published: (2008)
by: Haque, Md. Mokammel, et al.
Published: (2008)
Public key cryptography in resource-constrained WSN
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
A resource-optimal key pre-distribution scheme with improved security for wireless sensor networks
by: Dai, Tran Thanh, et al.
Published: (2006)
by: Dai, Tran Thanh, et al.
Published: (2006)
An efficient LU decomposition-based key pre-distribution scheme for ensuring security in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
An asymmetric key-based security architecture for wireless sensor networks
by: Haque, Md. Mokammel, et al.
Published: (2008)
by: Haque, Md. Mokammel, et al.
Published: (2008)
Security attacks and challenges in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
Securing sensor reports in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Security management in wireless sensor networks with a public key based scheme
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
A secure energy-efficient routing protocol for WSN
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Secure Group Association Management in Heterogeneous Distributed Sensor Networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
An efficient scheme for secure data transmission in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
A secure and efficient way of node membership verification in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
A security enhanced timestamp-based password authentication scheme using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
SERP: secure energy-efficient routing protocol for densely deployed wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
A secure lightweight approach of node membership verification in Dense HDSN
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Security in wireless sensor networks: issues and challenges
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
An efficient bilateral remote user authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Developing an efficient DMCIS with next-generation wireless networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Attacks on Shen et. al.’s remote user authentication scheme and defense*
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
An improved timestamp-based password authentication scheme with two-party verification using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Routing in mobile Ad Hoc Networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
Cryptanalysis of Yang-Wang-Chang’s password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Cryptanalysis of improved password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Feasibility of PKC in resource-constrained wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Bilinear-pairing-based remote user authentication schemes using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
Designing an efficient DMCIS with wireless sensor and ad hoc networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
An efficient PKC-based security architecture for wireless sensor networks
by: Haque, Md. Mokammel, et al.
Published: (2007)
by: Haque, Md. Mokammel, et al.
Published: (2007)
Securing wireless sensor networks with an efficient B+ tree-based key management scheme
by: Rasul, Khadija, et al.
Published: (2010)
by: Rasul, Khadija, et al.
Published: (2010)
An enhanced tree-based key management scheme for secure communication in wireless sensor network
by: Rasul, Khadija, et al.
Published: (2010)
by: Rasul, Khadija, et al.
Published: (2010)
Basics of security and cryptography
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Dominating Sets and Domination Polynomials of Graphs
by: Alikhani, Saeid
Published: (2009)
by: Alikhani, Saeid
Published: (2009)
Dominating Sets and Domination Polynomials of Cycles
by: Alikhania, Saeid, et al.
Published: (2008)
by: Alikhania, Saeid, et al.
Published: (2008)
Critical graphs with respect to total domination and connected domination
by: Kaemawichanurat, P., et al.
Published: (2016)
by: Kaemawichanurat, P., et al.
Published: (2016)
A novel and efficient bilateral remote user authentication
scheme using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Introduction to wireless sensor network security
by: Pathan, Al-Sakib Khan
Published: (2010)
by: Pathan, Al-Sakib Khan
Published: (2010)
Similar Items
-
Secure clustering in DSN with key predistribution and WCDS
by: Pathan, Al-Sakib Khan, et al.
Published: (2006) -
Weakly connected dominating set-based secure clustering and operation in distributed sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2009) -
An efficient public key based security architecture for wireless sensor networks
by: Haque, Md. Mokammel, et al.
Published: (2007) -
Securing U-Healthcare sensor networks using public key based scheme
by: Haque, Md. Mokammel, et al.
Published: (2008) -
A key management scheme with encoding and improved security for wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)