Yong-he Lin

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
In unattended or hostile environment like battlefield, sensor nodes may be compromised. If one node is compromised, group key which is shared by all the group members should be rekeyed in real-time and the compromised nodes should be revoked as soon as possible. As there is no such node that can always be trusted in sensor network, a distributed group(More)
  • 1