GROUP-BASED KEY MANAGEMENT PROTOCOL FOR ENERGY EFFICIENCY IN LONG-LIVED AND LARGE-SCALE DISTRIBUTED SENSOR NETWORKS
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Paek, Kwang-Jin | - |
dc.contributor.author | Kim, Jongwan | - |
dc.contributor.author | Hwang, Chong-Sun | - |
dc.contributor.author | Lee, SangKeun | - |
dc.contributor.author | Song, Ui-Sung | - |
dc.date.accessioned | 2021-09-09T16:36:05Z | - |
dc.date.available | 2021-09-09T16:36:05Z | - |
dc.date.created | 2021-06-15 | - |
dc.date.issued | 2008 | - |
dc.identifier.issn | 1335-9150 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/125568 | - |
dc.description.abstract | As wireless sensor networks grow, so does the need for effective security mechanisms. We propose a, cryptographic key-management protocol, called energy-efficient key-management (EEKM) protocol. Using a. location-based group key scheme, the protocol supports the revocation of compromised nodes and energy-efficient, rekeying. The design is motivated by the observation that unicast-based rekeying does not meet the security requirements of periodic rekeying in long-lived wireless sensor networks. EEKM supports broadcast-based rekeying for low-energy key management and high resilience. In addition, to match the increasing complexity of encryption keys, the protocol uses a dynamic composition key scheme. EEKM also Provides group-management protocols for secure group communication. We analyzed the energy efficiency and security of EEKM and compared it to other key-management protocols using a network simulator. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | SLOVAK ACAD SCIENCES INST INFORMATICS | - |
dc.title | GROUP-BASED KEY MANAGEMENT PROTOCOL FOR ENERGY EFFICIENCY IN LONG-LIVED AND LARGE-SCALE DISTRIBUTED SENSOR NETWORKS | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, SangKeun | - |
dc.identifier.wosid | 000263340100005 | - |
dc.identifier.bibliographicCitation | COMPUTING AND INFORMATICS, v.27, no.5, pp.743 - 756 | - |
dc.relation.isPartOf | COMPUTING AND INFORMATICS | - |
dc.citation.title | COMPUTING AND INFORMATICS | - |
dc.citation.volume | 27 | - |
dc.citation.number | 5 | - |
dc.citation.startPage | 743 | - |
dc.citation.endPage | 756 | - |
dc.type.rims | ART | - |
dc.type.docType | Article; Proceedings Paper | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Artificial Intelligence | - |
dc.subject.keywordAuthor | Energy efficiency | - |
dc.subject.keywordAuthor | key management | - |
dc.subject.keywordAuthor | security | - |
dc.subject.keywordAuthor | location-based | - |
dc.subject.keywordAuthor | sensor network | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.