سیویلیکا را در شبکه های اجتماعی دنبال نمایید.

A New key management scheme in heterogeneouswireless Sensornetworks

Publish Year: 1393
Type: Conference paper
Language: English
View: 629

This Paper With 5 Page And PDF Format Ready To Download

Export:

Link to this Paper:

Document National Code:

ICEES01_164

Index date: 6 March 2016

A New key management scheme in heterogeneouswireless Sensornetworks abstract

Wireless Sensor Networks (WSN) are used in manyapplications like battlefields, patient monitoring, emergenceresponse information and environmentalmonitoring. Toachieve security in WSN, it is important to be able to encryptthe messages sent between sensor nodes. It is required to agreeupon a common key before encrypting the messages. The keymanagement task is challenging due to resource constrainednature of WSN. In this paper, we are proposing a new treebased key management scheme which is based on BLOM keydistribution scheme forheterogeneous sensor networks. Theproposed scheme handles, various events like node addition,node compromise and key refresh at regular intervals

A New key management scheme in heterogeneouswireless Sensornetworks authors

Masoud Nemati Parashkouh

Department of Computer Software EngineeringRasht Branch, Islamic Azad UniversityRasht, Iran

Mohammadreza Yamaghani

Department of Computer Software EngineeringLahijan Branch, Islamic Azad UniversityLahijan , Iran

Peyman Bayat

Department of Computer Software EngineeringRasht Branch, Islamic Azad UniversityRasht, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
L.Eschenauer distributed ...
_ _ ons _ 47 , November2 002 , ...
H.Chan, A.Perrig, andD.Song. Raandomkey predistribution schemesfor sensor neftWorks. In IEEE ...
C.Wong, M.Gouda, and S. Lam, Secure Group Communication Using key ...
نمایش کامل مراجع