Skip to main content
Erschienen in: Wireless Networks 5/2017

29.02.2016

Energy efficient geographical key management scheme for authentication in mobile wireless sensor networks

verfasst von: Gnana Kousalya Chella Thevar, G. Rohini

Erschienen in: Wireless Networks | Ausgabe 5/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In wireless sensor networks, a sensor node communicates with a small set of neighbour sensor nodes and with the base station through a group leader or a cluster head. However, in some occasions, a sensor node required to move in the sensor networks. The node has to change its own position with the requirement of applications. Considering this phenomena, in this paper, we propose to design an angular function and private key management system authenticated by group leader for the transmission of a node. In the proposed scheme, the group is divided into sectors. The motion of the node is related with the angles to the group leader, which is the basis of our proposal. The nodes movement and activity should be tracked. The proposed scheme attains high connectivity and security with the help of the directional transreceiver. The lifetime of a node is increased, and it enables a node to move through the network and to transmit data to its neighbors.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kim, J., Lee, J., & Rim, K. (2010). Energy efficient key management protocol in wireless sensor networks. International Journal of Security and Its Applications, 4(2), 1–12. Kim, J., Lee, J., & Rim, K. (2010). Energy efficient key management protocol in wireless sensor networks. International Journal of Security and Its Applications, 4(2), 1–12.
2.
Zurück zum Zitat Jolly, G., Kuşçu, M. C., Kokate, P., & Younis, M. (2003). A low-energy key management protocol for wireless sensor networks”, In the proceedings of the 8 th IEEE symposium on computers and communications (ISCC’2003). Jolly, G., Kuşçu, M. C., Kokate, P., & Younis, M. (2003). A low-energy key management protocol for wireless sensor networks”, In the proceedings of the 8 th IEEE symposium on computers and communications (ISCC’2003).
3.
Zurück zum Zitat Kausar, Firdous, Hussain, Sajid, Yang, Laurence T., & Masood, Ashraf. (2008). Scalable and efficient key management for heterogeneous sensor networks. The Journal of Supercomputing Archive, 45(1), 44–65.CrossRef Kausar, Firdous, Hussain, Sajid, Yang, Laurence T., & Masood, Ashraf. (2008). Scalable and efficient key management for heterogeneous sensor networks. The Journal of Supercomputing Archive, 45(1), 44–65.CrossRef
4.
Zurück zum Zitat De Meulenaer, G., Gosset, F., Standaert, F. X., & Pereira, O. (2008). On the energy cost of communication and cryptography in wireless sensor networks. IEEE international conference on wireless and mobile computing, networking and communications, (WIMOB ‘08), (pp. 580–585). De Meulenaer, G., Gosset, F., Standaert, F. X., & Pereira, O. (2008). On the energy cost of communication and cryptography in wireless sensor networks. IEEE international conference on wireless and mobile computing, networking and communications, (WIMOB ‘08), (pp. 580–585).
5.
Zurück zum Zitat Kim, J. M., Cho, J. S., Jung, S. M., & Chung, T. M. (2007). An energy-efficient dynamic key management in wireless sensor networks. IEEE 9th international conference on advanced communication technology, (pp. 2148–2153). Kim, J. M., Cho, J. S., Jung, S. M., & Chung, T. M. (2007). An energy-efficient dynamic key management in wireless sensor networks. IEEE 9th international conference on advanced communication technology, (pp. 2148–2153).
6.
Zurück zum Zitat Reddy, R. S. (2011). Key mangament in wireless sensor networks using a modified Blom scheme. Cornell University Library, Cryptography and Security. Reddy, R. S. (2011). Key mangament in wireless sensor networks using a modified Blom scheme. Cornell University Library, Cryptography and Security.
7.
Zurück zum Zitat Hung, L. X., Canh, N. T., Lee, S., Lee, Y. K., & Lee, H. (2008). An energy-efficient secure routing and key management scheme for mobile sinks in wireless sensor networks using deployment knowledge. Sensors. doi:10.3390/s8127753. Hung, L. X., Canh, N. T., Lee, S., Lee, Y. K., & Lee, H. (2008). An energy-efficient secure routing and key management scheme for mobile sinks in wireless sensor networks using deployment knowledge. Sensors. doi:10.​3390/​s8127753.
8.
Zurück zum Zitat Singh, V. P., Jain, S., & Singhai, J. (2010). Hello flood attack and its countermeasures in wireless sensor networks. IJCSI International Journal of Computer Science Issues, 7(3), 23–24. Singh, V. P., Jain, S., & Singhai, J. (2010). Hello flood attack and its countermeasures in wireless sensor networks. IJCSI International Journal of Computer Science Issues, 7(3), 23–24.
9.
Zurück zum Zitat Sun, D. M., & He, B. (2006). Review of key management mechanisms in wireless sensor networks. Acta Automat Sin, 32(6), 900. Sun, D. M., & He, B. (2006). Review of key management mechanisms in wireless sensor networks. Acta Automat Sin, 32(6), 900.
10.
Zurück zum Zitat Sheela, D., Nirmala, S., Nath, S., & Mahadevan, G. (2011). A recent technique to detect sink hole attacks in WSN. International Conference Program Bangkok Thailand, (ISEM2011). Sheela, D., Nirmala, S., Nath, S., & Mahadevan, G. (2011). A recent technique to detect sink hole attacks in WSN. International Conference Program Bangkok Thailand, (ISEM2011).
11.
Zurück zum Zitat Singh, T., Kumar, V., Saxena, K., & Saxena, A. (2011). Evaluation of security conditions of protocols for data routing in wireless sensors networks. International Journal of Soft Computing and Engineering (IJSCE) 1(1), ISSN: 2231-2307. Singh, T., Kumar, V., Saxena, K., & Saxena, A. (2011). Evaluation of security conditions of protocols for data routing in wireless sensors networks. International Journal of Soft Computing and Engineering (IJSCE) 1(1), ISSN: 2231-2307.
12.
Zurück zum Zitat Son, Ju-Hyung, Lee, Jun-Sik, & Seo, Seung-Woo. (2010). Topological key hierarchy for energy-efficient group key management in wireless sensor networks. Springer, Wireless Personal Communications, 52(2), 359–382. doi:10.1007/s11277-008-9653-4.CrossRef Son, Ju-Hyung, Lee, Jun-Sik, & Seo, Seung-Woo. (2010). Topological key hierarchy for energy-efficient group key management in wireless sensor networks. Springer, Wireless Personal Communications, 52(2), 359–382. doi:10.​1007/​s11277-008-9653-4.CrossRef
13.
Zurück zum Zitat Mansour, I., Chalhoub, G., & Misson, M. (2011). Energy-efficient security protocol for wireless sensor networks using frequency hopping and permutation ciphering. Proceedings of the 1st international conference on pervasive and embedded computing and communication systems (pp. 277–282). Mansour, I., Chalhoub, G., & Misson, M. (2011). Energy-efficient security protocol for wireless sensor networks using frequency hopping and permutation ciphering. Proceedings of the 1st international conference on pervasive and embedded computing and communication systems (pp. 277–282).
14.
Zurück zum Zitat Chong, C. Y., & Kumar, S. P. (2003). Sensor networks: Evolution, opportunities, and challenges. Proceedings of IEEE Magazine, (pp. 1247–1256). Chong, C. Y., & Kumar, S. P. (2003). Sensor networks: Evolution, opportunities, and challenges. Proceedings of IEEE Magazine, (pp. 1247–1256).
15.
Zurück zum Zitat Kalita, H. K., & Kar, A. (2009). Wireless sensor network security analysis. International Journal of Next-Generation Networks IJNGN, 1(1), 1–10. Kalita, H. K., & Kar, A. (2009). Wireless sensor network security analysis. International Journal of Next-Generation Networks IJNGN, 1(1), 1–10.
16.
Zurück zum Zitat Tague, P., Li, M., & Poovendran, R. (2009). Mitigation of control channel jamming under node capture attacks. IEEE Transactions on Mobile Computing, 8(9), 1221–1234.CrossRef Tague, P., Li, M., & Poovendran, R. (2009). Mitigation of control channel jamming under node capture attacks. IEEE Transactions on Mobile Computing, 8(9), 1221–1234.CrossRef
17.
Zurück zum Zitat Xiaojiang, Du, Xiao, Yang, Ci, Song, Guizani, Mohsen, & Chen, Hsiao-Hwa. (2009). A routing-driven key management scheme for heterogeneous sensor networks. IEEE Transactions on Wireless Communications, 8(3), 1223–1229.CrossRef Xiaojiang, Du, Xiao, Yang, Ci, Song, Guizani, Mohsen, & Chen, Hsiao-Hwa. (2009). A routing-driven key management scheme for heterogeneous sensor networks. IEEE Transactions on Wireless Communications, 8(3), 1223–1229.CrossRef
18.
Zurück zum Zitat Gnana Kousalya, C., & Anandha Mala, G. S. (2011). An energy-efficient and resilient traffic-aware key management scheme for wireless sensor networks. European Journal of Scientific Research ISSN 1450-216X, 50(2), 246–262. Gnana Kousalya, C., & Anandha Mala, G. S. (2011). An energy-efficient and resilient traffic-aware key management scheme for wireless sensor networks. European Journal of Scientific Research ISSN 1450-216X, 50(2), 246–262.
19.
Zurück zum Zitat Sahingoz, O. K. (2013). Large scale wireless sensor networks with multi-level dynamic key management scheme. Journal of Systems Architecture, 59(9), 801–807.CrossRef Sahingoz, O. K. (2013). Large scale wireless sensor networks with multi-level dynamic key management scheme. Journal of Systems Architecture, 59(9), 801–807.CrossRef
20.
Zurück zum Zitat Li, Mo, et al. (2013). A survey on topology control in wireless sensor networks: Taxonomy, comparative study, and open issues. Proceedings of the IEEE, 101(12), 2538–2557.CrossRef Li, Mo, et al. (2013). A survey on topology control in wireless sensor networks: Taxonomy, comparative study, and open issues. Proceedings of the IEEE, 101(12), 2538–2557.CrossRef
21.
Zurück zum Zitat Chilamkurti, N., et al. (2009). Cross-layer support for energy efficient routing in wireless sensor networks. Journal of Sensors. Chilamkurti, N., et al. (2009). Cross-layer support for energy efficient routing in wireless sensor networks. Journal of Sensors.
22.
Zurück zum Zitat Yao, Y., et al. (2013). EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for wireless sensor networks. MASS 182–190. Yao, Y., et al. (2013). EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for wireless sensor networks. MASS 182–190.
23.
Zurück zum Zitat Yao, Y., et al. (2015). EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for heterogeneous wireless sensor networks. IEEE/ACM Transactions on Networking, 23(3), 810–823.CrossRef Yao, Y., et al. (2015). EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for heterogeneous wireless sensor networks. IEEE/ACM Transactions on Networking, 23(3), 810–823.CrossRef
24.
Zurück zum Zitat Han, K., et al. (2013). Algorithm design for data communications in duty-cycled wireless sensor networks: A survey. IEEE Communications Magazine, 51(7), 107–113.CrossRef Han, K., et al. (2013). Algorithm design for data communications in duty-cycled wireless sensor networks: A survey. IEEE Communications Magazine, 51(7), 107–113.CrossRef
25.
Zurück zum Zitat Sheng, Z., et al. (2013). A survey on the ietf protocol suite for the internet of things: Standards, challenges, and opportunities. Wireless Communications, IEEE, 20(6), 91–98.CrossRef Sheng, Z., et al. (2013). A survey on the ietf protocol suite for the internet of things: Standards, challenges, and opportunities. Wireless Communications, IEEE, 20(6), 91–98.CrossRef
26.
Zurück zum Zitat Xiao, Yang, et al. (2012). Tight performance bounds of multihop fair access for MAC protocols in wireless sensor networks and underwater sensor networks. IEEE Transactions on Mobile Computing, 11(10), 1538–1554.CrossRef Xiao, Yang, et al. (2012). Tight performance bounds of multihop fair access for MAC protocols in wireless sensor networks and underwater sensor networks. IEEE Transactions on Mobile Computing, 11(10), 1538–1554.CrossRef
27.
Zurück zum Zitat Zeng, Yuanyuan, et al. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19(2), 161–173.MathSciNetCrossRef Zeng, Yuanyuan, et al. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19(2), 161–173.MathSciNetCrossRef
28.
Zurück zum Zitat Xiang, L., et al. (2011). Compressed data aggregation for energy efficient wireless sensor networks. In 8th annual IEEE communications society conference on Sensor, mesh and ad hoc communications and networks (SECON), 2011, pp. 46–54. Xiang, L., et al. (2011). Compressed data aggregation for energy efficient wireless sensor networks. In 8th annual IEEE communications society conference on Sensor, mesh and ad hoc communications and networks (SECON), 2011, pp. 46–54.
29.
Zurück zum Zitat Sengupta, S., et al. (2012). An evolutionary multiobjective sleep-scheduling scheme for differentiated coverage in wireless sensor networks. IEEE Transactions on Systems, Man, and Cybernetics, Part C, 42(6), 1093–1102.CrossRef Sengupta, S., et al. (2012). An evolutionary multiobjective sleep-scheduling scheme for differentiated coverage in wireless sensor networks. IEEE Transactions on Systems, Man, and Cybernetics, Part C, 42(6), 1093–1102.CrossRef
30.
Zurück zum Zitat Wei, Guiyi, et al. (2011). Prediction-based data aggregation in wireless sensor networks: Combining grey model and Kalman filter. Computer Communications, 34(6), 793–802.CrossRef Wei, Guiyi, et al. (2011). Prediction-based data aggregation in wireless sensor networks: Combining grey model and Kalman filter. Computer Communications, 34(6), 793–802.CrossRef
31.
Zurück zum Zitat Liu, X.-Y., et al. (2015). CDC: Compressive data collection for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 26(8), 2188–2197.CrossRef Liu, X.-Y., et al. (2015). CDC: Compressive data collection for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 26(8), 2188–2197.CrossRef
32.
Zurück zum Zitat Song, Y., et al. (2014). A biology-based algorithm to minimal exposure problem of wireless sensor networks. IEEE Transactions on Network and Service Management, 11(3), 417–430.CrossRef Song, Y., et al. (2014). A biology-based algorithm to minimal exposure problem of wireless sensor networks. IEEE Transactions on Network and Service Management, 11(3), 417–430.CrossRef
33.
Zurück zum Zitat Liu, Y., et al. (2010). Multi-layer clustering routing algorithm for wireless vehicular sensor networks. IET Communications, 4(7), 810–816.CrossRef Liu, Y., et al. (2010). Multi-layer clustering routing algorithm for wireless vehicular sensor networks. IET Communications, 4(7), 810–816.CrossRef
34.
Zurück zum Zitat Xu, X., et al. (2015). Hierarchical data aggregation using compressive sensing (HDACS) in WSNs. ACM Transactions on Sensor Networks (TOSN), 11(3), 45.CrossRef Xu, X., et al. (2015). Hierarchical data aggregation using compressive sensing (HDACS) in WSNs. ACM Transactions on Sensor Networks (TOSN), 11(3), 45.CrossRef
35.
Zurück zum Zitat Bhuiyan, M. Z. A., et al. (2015). Local area prediction-based mobile target tracking in wireless sensor networks. IEEE Transactions on Computers, 64(7), 1968–1982.MathSciNetCrossRefMATH Bhuiyan, M. Z. A., et al. (2015). Local area prediction-based mobile target tracking in wireless sensor networks. IEEE Transactions on Computers, 64(7), 1968–1982.MathSciNetCrossRefMATH
36.
Zurück zum Zitat Busch, Costas, et al. (2012). Approximating congestion + dilation in networks via “quality of routing” games. IEEE Transactions on Computers, 61(9), 1270–1283.MathSciNetCrossRef Busch, Costas, et al. (2012). Approximating congestion + dilation in networks via “quality of routing” games. IEEE Transactions on Computers, 61(9), 1270–1283.MathSciNetCrossRef
37.
Zurück zum Zitat Li, Peng, et al. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25(12), 3264–3273.CrossRef Li, Peng, et al. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25(12), 3264–3273.CrossRef
38.
Zurück zum Zitat Dvir, A., et al. (2011). Backpressure-based routing protocol for DTNs. ACM SIGCOMM Computer Communication Review, 41(4), 405–406.MathSciNet Dvir, A., et al. (2011). Backpressure-based routing protocol for DTNs. ACM SIGCOMM Computer Communication Review, 41(4), 405–406.MathSciNet
39.
Zurück zum Zitat Vasilakos, A., et al. (2012). Delay tolerant networks: Protocols and applications. Boca Raton: CRC Press. Vasilakos, A., et al. (2012). Delay tolerant networks: Protocols and applications. Boca Raton: CRC Press.
40.
Zurück zum Zitat Liu, L., et al. (2015). Physarum optimization: A biology-inspired algorithm for the Steiner tree problem in networks. IEEE Transactions on Computers, 64(3), 819–832.MathSciNetMATH Liu, L., et al. (2015). Physarum optimization: A biology-inspired algorithm for the Steiner tree problem in networks. IEEE Transactions on Computers, 64(3), 819–832.MathSciNetMATH
42.
Zurück zum Zitat Zhou, Liang, et al. (2010). Context-aware middleware for multimedia services in heterogeneous networks. IEEE Intelligent Systems, 25(2), 40–47.CrossRef Zhou, Liang, et al. (2010). Context-aware middleware for multimedia services in heterogeneous networks. IEEE Intelligent Systems, 25(2), 40–47.CrossRef
43.
Zurück zum Zitat Acampora, G., et al. (2010). Interoperable and adaptive fuzzy services for ambient intelligence applications. ACM Transactions on Autonomous and Adaptive Systems (TAAS), 5(2), 8. Acampora, G., et al. (2010). Interoperable and adaptive fuzzy services for ambient intelligence applications. ACM Transactions on Autonomous and Adaptive Systems (TAAS), 5(2), 8.
44.
Zurück zum Zitat Fadlullah, Z. M., et al. (2010). DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transactions on Networking, 18(4), 1234–1247.CrossRef Fadlullah, Z. M., et al. (2010). DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transactions on Networking, 18(4), 1234–1247.CrossRef
45.
Zurück zum Zitat Jing, Qi, et al. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501.CrossRef Jing, Qi, et al. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501.CrossRef
46.
Zurück zum Zitat Yan, Zheng, et al. (2014). A survey on trust management for internet of things. Journal of Network and Computer Applications, 42, 120–134.CrossRef Yan, Zheng, et al. (2014). A survey on trust management for internet of things. Journal of Network and Computer Applications, 42, 120–134.CrossRef
47.
Zurück zum Zitat Zhang, Xin Ming, et al. (2015). Interference-based topology control algorithm for delay-constrained mobile Ad hoc networks. IEEE Transactions on Mobile Computing, 14(4), 742–754.CrossRef Zhang, Xin Ming, et al. (2015). Interference-based topology control algorithm for delay-constrained mobile Ad hoc networks. IEEE Transactions on Mobile Computing, 14(4), 742–754.CrossRef
48.
Zurück zum Zitat Vasilakos, Athanasios V., et al. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1–10.CrossRef Vasilakos, Athanasios V., et al. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1–10.CrossRef
49.
Zurück zum Zitat Yang, M., et al. (2015). Software-defined and virtualized future mobile and wireless networks: A survey. ACM/Springer Mobile Networks and Applications, 20(1), 4–18.CrossRef Yang, M., et al. (2015). Software-defined and virtualized future mobile and wireless networks: A survey. ACM/Springer Mobile Networks and Applications, 20(1), 4–18.CrossRef
50.
Zurück zum Zitat Wei, L., et al. (2010). SecCloud: Bridging secure storage and computation in cloud. ICDCS Workshops, pp. 52–61. Wei, L., et al. (2010). SecCloud: Bridging secure storage and computation in cloud. ICDCS Workshops, pp. 52–61.
51.
Zurück zum Zitat Xiong, Naixue, et al. (2009). Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems. IEEE Journal on Selected Areas in Communications, 27(4), 495–509.CrossRef Xiong, Naixue, et al. (2009). Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems. IEEE Journal on Selected Areas in Communications, 27(4), 495–509.CrossRef
52.
Zurück zum Zitat He, Daojing, et al. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.MathSciNetCrossRef He, Daojing, et al. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.MathSciNetCrossRef
53.
Zurück zum Zitat He, Daojing, et al. (2012). A distributed trust evaluation model and its application scenarios for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(6), 1164–1175.MathSciNetCrossRef He, Daojing, et al. (2012). A distributed trust evaluation model and its application scenarios for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(6), 1164–1175.MathSciNetCrossRef
54.
Zurück zum Zitat Zhang, Zhaoyang, et al. (2012). ECG-cryptography and authentication in body area networks. IEEE Transactions on Information Technology in Biomedicine, 16(6), 1070–1078.MathSciNetCrossRef Zhang, Zhaoyang, et al. (2012). ECG-cryptography and authentication in body area networks. IEEE Transactions on Information Technology in Biomedicine, 16(6), 1070–1078.MathSciNetCrossRef
55.
Zurück zum Zitat Liu, J., et al. (2016). Leveraging software-defined networking for security policy enforcement. Information Sciences, 327, 288–299.CrossRef Liu, J., et al. (2016). Leveraging software-defined networking for security policy enforcement. Information Sciences, 327, 288–299.CrossRef
56.
Zurück zum Zitat Zhou, Jun, et al. (2015). 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Information Sciences, 314, 255–276.CrossRef Zhou, Jun, et al. (2015). 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Information Sciences, 314, 255–276.CrossRef
57.
Zurück zum Zitat Zhou, J., et al. (2013). Securing m-healthcare social networks: Challenges, countermeasures and future directions. IEEE Wireless Communications, 20(4), 12–21.CrossRef Zhou, J., et al. (2013). Securing m-healthcare social networks: Challenges, countermeasures and future directions. IEEE Wireless Communications, 20(4), 12–21.CrossRef
58.
Zurück zum Zitat Yang, Haomin, et al. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.CrossRef Yang, Haomin, et al. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.CrossRef
59.
Zurück zum Zitat Liang, H., & Wang, C. (2011). An energy efficient dynamic key management scheme based on polynomial and cluster in wireless sensor networks. Journal of Convergence Information Technology, 6(5), 321.CrossRef Liang, H., & Wang, C. (2011). An energy efficient dynamic key management scheme based on polynomial and cluster in wireless sensor networks. Journal of Convergence Information Technology, 6(5), 321.CrossRef
Metadaten
Titel
Energy efficient geographical key management scheme for authentication in mobile wireless sensor networks
verfasst von
Gnana Kousalya Chella Thevar
G. Rohini
Publikationsdatum
29.02.2016
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 5/2017
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-016-1228-9

Weitere Artikel der Ausgabe 5/2017

Wireless Networks 5/2017 Zur Ausgabe

Neuer Inhalt