Learn More
  • Qiuhua Wang
  • 2011
A number of self-healing group key distribution schemes have been proposed recently, however, though practicality analysis and simulation of the commonly used self-healing group key distribution schemes, we show that almost none of the existing schemes are suitable for large-scale and resource-constricted wireless sensor networks in real-world applications,(More)
  • Qiuhua Wang
  • 2010
Recently, T. Yuan et al. proposed a self-healing key distribution with revocation and collusion resistance for wireless sensor networks based on the revocation and participation polynomials. However, we show that T. Yuan's scheme is insecure against the proposed attack. In this paper, we modify the T. Yuan's scheme and further propose a secure and efficient(More)
—The self-healing group key distribution with revocation can deal with the session key distribution problem for secure group communication over an unreliable wireless network, with the capability of resistance to the packet loss and the collusion attack. However, since previous self-healing group key distribution schemes are restricted to m sessions, they(More)
This article mainly introduced one kind of key assignment scheme based on traditional symmetrical cryptogram system. It divides keys in system from lowers to high into three ranks - primary key, secondary key and the host master key. The primary keys cannot appear in the plaintext form, but are transmitted and preserved in the form of encryption. The(More)
Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical(More)
  • 1