A hash chains based key management scheme for wireless sensor networks

5Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

High secure connectivity and invulnerability are two important goals of wireless sensor networks. However, many existing key management schemes for wireless sensor networks cannot achieve the two goals simultaneously. To solve the problem, the paper proposed a key management scheme based on hash chains and auxiliary nodes. In the scheme, adjacent sensor nodes can establish shared session keys with high probabilities; besides, the validity of chain keys including their identifiers can be distinguished by hash functions. Analyses show that the scheme not only can achieve the two goals to secure wireless sensor networks, but also can has advantages in terms of storage, communication overhead, and computation overhead. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Zhao, H., Qin, J., Shu, M., & Hu, J. (2012). A hash chains based key management scheme for wireless sensor networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7672 LNCS, pp. 296–308). https://doi.org/10.1007/978-3-642-35362-8_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free