About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
2nd International ICST Workshop on Advances in Wireless Sensor Networks 2007

Research Article

Secure Multiple Deployment in Wireless Sensor Networks

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/MOBIQ.2007.4451043,
        author={ Guorui  Li and Jingsha  He and  Yingfang  Fu},
        title={Secure Multiple Deployment in Wireless Sensor Networks},
        proceedings={2nd International ICST Workshop on Advances in Wireless Sensor Networks 2007},
        publisher={IEEE},
        proceedings_a={IWASN},
        year={2008},
        month={2},
        keywords={Authentication  Base stations  Communication system security  Computer science  Data security  Educational institutions  Network servers  Public key  Public key cryptography  Wireless sensor networks},
        doi={10.1109/MOBIQ.2007.4451043}
    }
    
  • Guorui Li
    Jingsha He
    Yingfang Fu
    Year: 2008
    Secure Multiple Deployment in Wireless Sensor Networks
    IWASN
    IEEE
    DOI: 10.1109/MOBIQ.2007.4451043
Guorui Li1,*, Jingsha He2,*, Yingfang Fu3,*
  • 1: College of Computer Science and Technology Beijing University of Technology Beijing 100022, Chin
  • 2: School of Software Engineering Beijing University of Technology Beijing 100022, China
  • 3: College of Computer Science and Technology Beijing University of Technology Beijing 100022, China
*Contact email: liguorui@emails.bjut.edu.cn, jhe@bjut.edu.cn, fmsik@emails.bjut.edu.cn

Abstract

As a fundamental requirement for providing security functionality in sensor networks, key management plays a central role in authentication and encryption. In this paper, we propose the adaptive key selection (AKS) scheme and the adaptive key selection algorithm for secure multiple deployment in sensor networks that target at providing high connectivity between different deployment sets of sensor nodes. Our simulation shows that the AKS scheme can greatly improve the connectivity of sensor nodes while maintaining the security of an existing multiple deployment scheme at the same time.

Keywords
Authentication Base stations Communication system security Computer science Data security Educational institutions Network servers Public key Public key cryptography Wireless sensor networks
Published
2008-02-12
Publisher
IEEE
Modified
2011-08-08
http://dx.doi.org/10.1109/MOBIQ.2007.4451043
Copyright © 2007–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL