A KEY MANAGEMENT APPROACH FOR WIRELESS
SENSOR NETWORKS
A. Jouharpour. International Journal of Information Technology, Modeling and Computing (IJITMC), 2, page 01-09. (August 2014)
DOI: 10.5121/ijitmc.2014.2301
Abstract
In this paper we presenta key management approach for wireless sensor networks. This approach facilitating an efficient scalable post-distribution key establishment that provides different security services. We have developed and tested this approach under TinyOs. Result shows that this approach provides acceptable resistance against node capture attacks and replay attacks. The provision of security services is completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
%0 Conference Paper
%1 conf/ifip13/ThengTT10a
%A Jouharpour, Ali Bagherinia Akbar Bemana Sohrab Hojjatkhah Ali
%B International Journal of Information Technology, Modeling and Computing (IJITMC)
%D 2014
%K Sensor flexibility key management networks resistant. scalability
%N 3
%P 01-09
%R 10.5121/ijitmc.2014.2301
%T A KEY MANAGEMENT APPROACH FOR WIRELESS
SENSOR NETWORKS
%U http://airccse.org/journal/ijitmc/papers/2314ijitmc01.pdf
%V 2
%X In this paper we presenta key management approach for wireless sensor networks. This approach facilitating an efficient scalable post-distribution key establishment that provides different security services. We have developed and tested this approach under TinyOs. Result shows that this approach provides acceptable resistance against node capture attacks and replay attacks. The provision of security services is completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
@inproceedings{conf/ifip13/ThengTT10a,
abstract = { In this paper we presenta key management approach for wireless sensor networks. This approach facilitating an efficient scalable post-distribution key establishment that provides different security services. We have developed and tested this approach under TinyOs. Result shows that this approach provides acceptable resistance against node capture attacks and replay attacks. The provision of security services is completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this approach is appropriate to be used in a wireless sensor network of hundreds of nodes.},
added-at = {2018-09-03T08:48:23.000+0200},
author = {Jouharpour, Ali Bagherinia Akbar Bemana Sohrab Hojjatkhah Ali},
biburl = {https://www.bibsonomy.org/bibtex/29fca0c48e6937b42ffcf4fcd7bd52c8f/alexafedrica},
booktitle = {International Journal of Information Technology, Modeling and Computing (IJITMC)},
doi = {10.5121/ijitmc.2014.2301},
ee = {https://doi.org/10.1007/978-3-642-15231-3_32},
interhash = {f270feae63cf5cd1c3737050d90b5466},
intrahash = {9fca0c48e6937b42ffcf4fcd7bd52c8f},
keywords = {Sensor flexibility key management networks resistant. scalability},
month = {August},
number = 3,
pages = {01-09},
timestamp = {2018-09-03T08:48:23.000+0200},
title = {A KEY MANAGEMENT APPROACH FOR WIRELESS
SENSOR NETWORKS
},
url = {http://airccse.org/journal/ijitmc/papers/2314ijitmc01.pdf},
volume = 2,
year = 2014
}