A key management scheme for wireless sensor networks using deployment knowledge
Citations
[...]
7,116 citations
1,200 citations
Cites methods from "A key management scheme for wireles..."
...Du et al. proposed a method to improve the Eschenauer-Gligor scheme using ap riorideployment knowledge [ 9 ]....
[...]
1,123 citations
1,097 citations
968 citations
Cites background from "A key management scheme for wireles..."
...In addition, deployment knowledge has been explored for pairwise key establishment [Du et al. 2004; Liu and Ning 2003b]....
[...]
References
14,980 citations
"A key management scheme for wireles..." refers background in this paper
...There are three types of general key agreement schemes: trusted-server scheme, self-enforcing scheme, and key pre-distribution scheme....
[...]
14,659 citations
14,048 citations
"A key management scheme for wireles..." refers background in this paper
...I. INTRODUCTION Recent advances in electronic and computer technologies have paved the way for the proliferation of wireless sensor networks (WSN)....
[...]
[...]
7,116 citations
"A key management scheme for wireles..." refers methods in this paper
...When node distribution and key sharing are uniform, global connectivity can be estimated using the local connectivity and other network parameters using Erd ős random graph theorem [23], just like what has been done in [9], [10]....
[...]
3,900 citations
"A key management scheme for wireles..." refers background or methods in this paper
...The Eschenauer-Gligor scheme [9] have been described earlier in this section....
[...]
...Another key pre-distribution scheme is to let each sensor carry N − 1 secret pairwise keys, each of which is known only to this sensor and one of the other N−1 sensors (assuming N is the total number of sensors)....
[...]
...We will show how this knowledge can help improve the random key pre-distribution scheme proposed by Eschenauer and Gligor in [9]....
[...]
...In this paper, we exploit deployment knowledge in the random key pre-distribution scheme [9], such that the probability p can be maximized while the other performance metrics (such as security and memory usage) are not degraded....
[...]
...With this general model, the existing key pre-distribution schemes for sensor networks are special cases: they all assume that fi(x, y) = 1XY for x ∈ [0,X], y ∈ [0, Y ] and 1 ≤ i ≤ N , i.e., all sensor nodes are uniformly distributed over the whole deployment region....
[...]