Research Article
Secure Multiple Deployment in Wireless Sensor Networks
@INPROCEEDINGS{10.1109/MOBIQ.2007.4451043, author={ Guorui Li and Jingsha He and Yingfang Fu}, title={Secure Multiple Deployment in Wireless Sensor Networks}, proceedings={2nd International ICST Workshop on Advances in Wireless Sensor Networks 2007}, publisher={IEEE}, proceedings_a={IWASN}, year={2008}, month={2}, keywords={Authentication Base stations Communication system security Computer science Data security Educational institutions Network servers Public key Public key cryptography Wireless sensor networks}, doi={10.1109/MOBIQ.2007.4451043} }
- Guorui Li
Jingsha He
Yingfang Fu
Year: 2008
Secure Multiple Deployment in Wireless Sensor Networks
IWASN
IEEE
DOI: 10.1109/MOBIQ.2007.4451043
Abstract
As a fundamental requirement for providing security functionality in sensor networks, key management plays a central role in authentication and encryption. In this paper, we propose the adaptive key selection (AKS) scheme and the adaptive key selection algorithm for secure multiple deployment in sensor networks that target at providing high connectivity between different deployment sets of sensor nodes. Our simulation shows that the AKS scheme can greatly improve the connectivity of sensor nodes while maintaining the security of an existing multiple deployment scheme at the same time.
Copyright © 2007–2024 IEEE