A low-energy key management protocol for wireless sensor networks

@article{Jolly2003ALK,
  title={A low-energy key management protocol for wireless sensor networks},
  author={G. Jolly and M. Kusçu and Pallavi Kokate and M. Younis},
  journal={Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003},
  year={2003},
  pages={335-340 vol.1}
}
  • G. Jolly, M. Kusçu, +1 author M. Younis
  • Published 2003
  • Computer Science
  • Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003
  • Wireless sensor networks have a wide spectrum of civil and military applications that call for security, e.g., target surveillance in hostile environments. [...] Key Method The protocol supports the eviction of the compromised nodes. Simulation shows that the key management is remarkably low thanks to the multi-tier network architecture in which only sensor-to-gateway secure sessions are allowed, and reports order-of-magnitude improvement in energy saving as compared to the original IBSK scheme, and Kerberos…Expand Abstract
    207 Citations
    Key re-establishment protocols in hierarchical wireless sensor networks
    • 1
    An efficient key management protocol for wireless sensor networks
    A Low Energy Key Management Scheme in Wireless Sensor Networks
    • 1
    A Novel Energy Efficient Mechanism for Secured Routing of Wireless Sensor Network
    • Highly Influenced
    • PDF
    A Key Management Scheme with Encoding and Improved Security for Wireless Sensor Networks
    • 14
    Lightweight key management for wireless sensor networks
    • 38
    Key Management inWireless Sensor Networks
    • 11
    • PDF
    An unconditionally secure key management scheme for large-scale heterogeneous wireless sensor networks
    • A. K. Das
    • Computer Science
    • 2009 First International Communication Systems and Networks and Workshops
    • 2009
    • 30
    • Highly Influenced
    • PDF

    References

    SHOWING 1-10 OF 20 REFERENCES
    CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY
    • 771
    • Highly Influential
    • PDF
    A key-management scheme for distributed sensor networks
    • 4,009
    • PDF
    Energy efficient protocols for low duty cycle wireless microsensor networks
    • Seong-Hwan Cho, A. Chandrakasan
    • Computer Science
    • 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221)
    • 2001
    • 97
    • PDF
    Energy-Aware TDMA-Based MAC for Sensor Networks
    • 286
    • PDF
    Performance evaluation of load-balanced clustering of wireless sensor networks
    • G. Gupta, M. Younis
    • Computer Science
    • 10th International Conference on Telecommunications, 2003. ICT 2003.
    • 2003
    • 155
    • PDF
    Energy-aware routing in cluster-based sensor networks
    • M. Younis, M. Youssef, K. A. Arisha
    • Computer Science
    • Proceedings. 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems
    • 2002
    • 628
    • PDF
    Bootstrapping security associations for routing in mobile ad-hoc networks
    • 92
    • PDF
    PicoRadios for wireless sensor networks: the next challenge in ultra-low power design
    • J. Rabaey, J. Ammer, +4 authors T. Tuan
    • Engineering
    • 2002 IEEE International Solid-State Circuits Conference. Digest of Technical Papers (Cat. No.02CH37315)
    • 2002
    • 418
    • PDF
    SPINS : Security Protocols for Sensor Networks
    • 3,389
    • PDF