Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Effective Key Management in Dynamic Wireless Sensor Networks

Full metadata record
DC Field Value Language
dc.contributor.authorSeo, Seung-Hyun-
dc.contributor.authorWon, Jongho-
dc.contributor.authorSultana, Salmin-
dc.contributor.authorBertino, Elisa-
dc.date.accessioned2021-09-04T19:28:13Z-
dc.date.available2021-09-04T19:28:13Z-
dc.date.created2021-06-15-
dc.date.issued2015-02-
dc.identifier.issn1556-6013-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/94445-
dc.description.abstractRecently, wireless sensor networks (WSNs) have been deployed for a wide variety of applications, including military sensing and tracking, patient status monitoring, traffic flow monitoring, where sensory devices often move between different locations. Securing data and communications requires suitable encryption key protocols. In this paper, we propose a certificateless-effective key management (CL-EKM) protocol for secure communication in dynamic WSNs characterized by node mobility. The CL-EKM supports efficient key updates when a node leaves or joins a cluster and ensures forward and backward key secrecy. The protocol also supports efficient key revocation for compromised nodes and minimizes the impact of a node compromise on the security of other communication links. A security analysis of our scheme shows that our protocol is effective in defending against various attacks. We implement CL-EKM in Contiki OS and simulate it using Cooja simulator to assess its time, energy, communication, and memory performance.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.subjectELLIPTIC CURVE CRYPTOGRAPHY-
dc.titleEffective Key Management in Dynamic Wireless Sensor Networks-
dc.typeArticle-
dc.contributor.affiliatedAuthorSeo, Seung-Hyun-
dc.identifier.doi10.1109/TIFS.2014.2375555-
dc.identifier.scopusid2-s2.0-84921344790-
dc.identifier.wosid000352560400013-
dc.identifier.bibliographicCitationIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.10, no.2, pp.371 - 383-
dc.relation.isPartOfIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY-
dc.citation.titleIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY-
dc.citation.volume10-
dc.citation.number2-
dc.citation.startPage371-
dc.citation.endPage383-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.subject.keywordPlusELLIPTIC CURVE CRYPTOGRAPHY-
dc.subject.keywordAuthorWireless sensor networks-
dc.subject.keywordAuthorcertificateless public key cryptography-
dc.subject.keywordAuthorkey management scheme-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Science and Technology > Department of Mathematics > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE