Improving Identity-based Random Key Establishment Scheme for Large-Scale Hierarchical Wireless Sensor Networks

@article{Das2012ImprovingIR,
  title={Improving Identity-based Random Key Establishment Scheme for Large-Scale Hierarchical Wireless Sensor Networks},
  author={Ashok Kumar Das},
  journal={I. J. Network Security},
  year={2012},
  volume={14},
  pages={1-21}
}
In this paper, we propose a novel identity-based random key pre-distribution scheme called the identity based key pre-distribution using a pseudo random function (IBPRF), which has better trade-off between communication overhead, network connectivity and resilience against node capture compared to the other existing key predistribution schemes. IBPRF always guarantees that no matter how many sensor nodes are captured, the secret communication between non-compromised sensor nodes are still… CONTINUE READING
Highly Cited
This paper has 176 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 16 extracted citations

A Taxonomy of Key Management Schemes of Wireless Sensor Networks

2015 Fifth International Conference on Advanced Computing & Communication Technologies • 2015
View 3 Excerpts
Highly Influenced

176 Citations

050'14'16'18
Citations per Year
Semantic Scholar estimates that this publication has 176 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 38 references

An identity-based random key predistribution scheme for direct key establishment to prevent attacks in wireless sensor networks

A. K. Das
International Journal of Network Security, • 2008
View 10 Excerpts
Highly Influenced

Establishing pairwise keys in distributed sensor networks

ACM Conference on Computer and Communications Security • 2003
View 10 Excerpts
Highly Influenced

Random Key Predistribution Schemes for Sensor Networks

IEEE Symposium on Security and Privacy • 2003
View 10 Excerpts
Highly Influenced

A key-management scheme for distributed sensor networks

ACM Conference on Computer and Communications Security • 2002
View 11 Excerpts
Highly Influenced

A survey on analytic studies of key distribution mechanisms in wireless sensor networks

A. K. Das
Journal of Information Assurance and Security, • 2010
View 1 Excerpt

Similar Papers

Loading similar papers…