Secure Dynamic Key Management for Sensor Networks
Citations
8 citations
Cites background from "Secure Dynamic Key Management for S..."
...Another aspect that would need more investigation with regards to key management is energy in light of nodes that utilize the active/sleep state ( Riaz, Ali, Kim, Ahmad and Suguri, 2006 )....
[...]
8 citations
5 citations
4 citations
Cites background from "Secure Dynamic Key Management for S..."
...Once KCL is generated, each CL generates seed SCi different from SCL....
[...]
References
14,048 citations
"Secure Dynamic Key Management for S..." refers background in this paper
...However securing key management process is not a trivial task....
[...]
3,900 citations
"Secure Dynamic Key Management for S..." refers methods in this paper
...After assignment, keys are delivered to their designated nodes in Key Distribution phase....
[...]
3,125 citations
"Secure Dynamic Key Management for S..." refers methods in this paper
...After assignment, keys are delivered to their designated nodes in Key Distribution phase....
[...]
1,001 citations
"Secure Dynamic Key Management for S..." refers methods in this paper
...After assignment, keys are delivered to their designated nodes in Key Distribution phase....
[...]
487 citations
"Secure Dynamic Key Management for S..." refers background in this paper
...This work presents a novel approach in which original keys to be used for securing communication are never transmitted across the insecure medium ....
[...]