An efficient identity-based key management scheme for wireless sensor networks using the bloom filter

14Citations
Citations of this article
26Readers
Mendeley users who have this article in their library.

Abstract

With the rapid development and widespread adoption of wireless sensor networks (WSNs), security has become an increasingly prominent problem. How to establish a session key in node communication is a challenging task for WSNs. Considering the limitations in WSNs, such as low computing capacity, small memory, power supply limitations and price, we propose an efficient identity-based key management (IBKM) scheme, which exploits the Bloom filter to authenticate the communication sensor node with storage efficiency. The security analysis shows that IBKM can prevent several attacks effectively with acceptable computation and communication overhead.

Cite

CITATION STYLE

APA

Qin, Z., Zhang, X., Feng, K., Zhang, Q., & Huang, J. (2014). An efficient identity-based key management scheme for wireless sensor networks using the bloom filter. Sensors (Switzerland), 14(10), 17937–17951. https://doi.org/10.3390/s141017937

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free