A beneficial analysis of deployment knowledge for key distribution in wireless sensor networks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Nguyen Thi Thanh Huyen | - |
dc.contributor.author | Jo, Minho | - |
dc.contributor.author | Tien-Dung Nguyen | - |
dc.contributor.author | Huh, Eui-Nam | - |
dc.date.accessioned | 2021-09-06T20:11:10Z | - |
dc.date.available | 2021-09-06T20:11:10Z | - |
dc.date.created | 2021-06-18 | - |
dc.date.issued | 2012-05 | - |
dc.identifier.issn | 1939-0114 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/108476 | - |
dc.description.abstract | Because of the resource constraints on sensor networks, many recent key management schemes exploit the location of nodes in order to establish pairwise keys. Despite these efforts, location discovery for sensor networks is very difficult because existing schemes have failed to consider changes in the signal range and the deployment error. As a result, network performance may accidentally decrease, whereas costs increase. In this paper, we used the theory of the signal range and deployment error knowledge to analyze sensor nodes location information. Combining with the probabilistic pre-distribution method, we proposed a scheme that provides high connectivity and secure communication with better communication overhead by defining an efficient number of adjacent cells and determining the adequate length of the cell. With such optimistic results, novel deployment knowledge is also expected to provide superior performance with different types of key distribution schemes. Copyright (c) 2011 John Wiley & Sons, Ltd. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | WILEY-HINDAWI | - |
dc.subject | MANAGEMENT | - |
dc.title | A beneficial analysis of deployment knowledge for key distribution in wireless sensor networks | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Jo, Minho | - |
dc.identifier.doi | 10.1002/sec.337 | - |
dc.identifier.scopusid | 2-s2.0-84859896093 | - |
dc.identifier.wosid | 000302947400005 | - |
dc.identifier.bibliographicCitation | SECURITY AND COMMUNICATION NETWORKS, v.5, no.5, pp.485 - 495 | - |
dc.relation.isPartOf | SECURITY AND COMMUNICATION NETWORKS | - |
dc.citation.title | SECURITY AND COMMUNICATION NETWORKS | - |
dc.citation.volume | 5 | - |
dc.citation.number | 5 | - |
dc.citation.startPage | 485 | - |
dc.citation.endPage | 495 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | MANAGEMENT | - |
dc.subject.keywordAuthor | polynomial pre-distribution | - |
dc.subject.keywordAuthor | key pre-distribution | - |
dc.subject.keywordAuthor | wireless sensor network | - |
dc.subject.keywordAuthor | key management | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.