Secured Communication Key Establishment for Cluster-Based Wireless Sensor Networks
The resource-constraint nature of wireless sensor networks (WSNs) has caused the security one of biggest challenges. An efficient key management scheme is the pre-requisite to ensure security in WSN. In this paper the authors present two versions of a secured key management scheme adopted on cluster...
Ausführliche Beschreibung
Autor*in: |
Mamun, Quazi [verfasserIn] Islam, Rafiqul [verfasserIn] Kaosar, Mohammed [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2015 |
---|
Umfang: |
1 Online-Ressource |
---|
Übergeordnetes Werk: |
Enthalten in: International journal of wireless networks and broadband technologies - Hershey, Pa : IGI Global, 2011, 4(2015), 1, Seite 29-44 |
---|---|
Übergeordnetes Werk: |
volume:4 ; year:2015 ; number:1 ; pages:29-44 |
Links: |
---|
DOI / URN: |
10.4018/ijwnbt.2015010103 |
---|
Katalog-ID: |
NLEJ251839613 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | NLEJ251839613 | ||
003 | DE-627 | ||
005 | 20231205144031.0 | ||
007 | cr uuu---uuuuu | ||
008 | 231128s2015 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.4018/ijwnbt.2015010103 |2 doi | |
035 | |a (DE-627)NLEJ251839613 | ||
035 | |a (VZGNL)10.4018/ijwnbt.2015010103 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
100 | 1 | |a Mamun, Quazi |e verfasserin |4 aut | |
245 | 1 | 0 | |a Secured Communication Key Establishment for Cluster-Based Wireless Sensor Networks |
264 | 1 | |c 2015 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a The resource-constraint nature of wireless sensor networks (WSNs) has caused the security one of biggest challenges. An efficient key management scheme is the pre-requisite to ensure security in WSN. In this paper the authors present two versions of a secured key management scheme adopted on cluster-based topology of sensor network. The proposed schemes use partial key pre-distribution and symmetric cryptography techniques, and shows high resilience to different security attacks. Whereas one version of the proposed protocol uses shared partial keys in a cluster, the other version uses private partial keys. Both versions of the proposed key management scheme outperform other random key pre- distribution protocols in the sense that it requires lower space, lower communication overhead and offers very high session key candidates | ||
653 | |a Key Establishment |a Partial Key |a Pre-Distribution |a Security |a Symmetric Cryptography | ||
700 | 1 | |a Islam, Rafiqul |e verfasserin |4 aut | |
700 | 1 | |a Kaosar, Mohammed |e verfasserin |4 aut | |
773 | 0 | 8 | |i Enthalten in |t International journal of wireless networks and broadband technologies |d Hershey, Pa : IGI Global, 2011 |g 4(2015), 1, Seite 29-44 |h Online-Ressource |w (DE-627)NLEJ244419671 |w (DE-600)2703700-9 |x 2155-627X |7 nnns |
773 | 1 | 8 | |g volume:4 |g year:2015 |g number:1 |g pages:29-44 |
856 | 4 | 0 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijwnbt.2015010103 |m X:IGIG |x Verlag |z Deutschlandweit zugänglich |
856 | 4 | 2 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijwnbt.2015010103&buylink=true |3 Abstract |
912 | |a ZDB-1-GIS | ||
912 | |a GBV_NL_ARTICLE | ||
951 | |a AR | ||
952 | |d 4 |j 2015 |e 1 |h 29-44 |
author_variant |
q m qm r i ri m k mk |
---|---|
matchkey_str |
article:2155627X:2015----::euecmuiaineetbihetocutraewr |
hierarchy_sort_str |
2015 |
publishDate |
2015 |
allfields |
10.4018/ijwnbt.2015010103 doi (DE-627)NLEJ251839613 (VZGNL)10.4018/ijwnbt.2015010103 DE-627 ger DE-627 rakwb eng Mamun, Quazi verfasserin aut Secured Communication Key Establishment for Cluster-Based Wireless Sensor Networks 2015 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier The resource-constraint nature of wireless sensor networks (WSNs) has caused the security one of biggest challenges. An efficient key management scheme is the pre-requisite to ensure security in WSN. In this paper the authors present two versions of a secured key management scheme adopted on cluster-based topology of sensor network. The proposed schemes use partial key pre-distribution and symmetric cryptography techniques, and shows high resilience to different security attacks. Whereas one version of the proposed protocol uses shared partial keys in a cluster, the other version uses private partial keys. Both versions of the proposed key management scheme outperform other random key pre- distribution protocols in the sense that it requires lower space, lower communication overhead and offers very high session key candidates Key Establishment Partial Key Pre-Distribution Security Symmetric Cryptography Islam, Rafiqul verfasserin aut Kaosar, Mohammed verfasserin aut Enthalten in International journal of wireless networks and broadband technologies Hershey, Pa : IGI Global, 2011 4(2015), 1, Seite 29-44 Online-Ressource (DE-627)NLEJ244419671 (DE-600)2703700-9 2155-627X nnns volume:4 year:2015 number:1 pages:29-44 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijwnbt.2015010103 X:IGIG Verlag Deutschlandweit zugänglich http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijwnbt.2015010103&buylink=true Abstract ZDB-1-GIS GBV_NL_ARTICLE AR 4 2015 1 29-44 |
spelling |
10.4018/ijwnbt.2015010103 doi (DE-627)NLEJ251839613 (VZGNL)10.4018/ijwnbt.2015010103 DE-627 ger DE-627 rakwb eng Mamun, Quazi verfasserin aut Secured Communication Key Establishment for Cluster-Based Wireless Sensor Networks 2015 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier The resource-constraint nature of wireless sensor networks (WSNs) has caused the security one of biggest challenges. An efficient key management scheme is the pre-requisite to ensure security in WSN. In this paper the authors present two versions of a secured key management scheme adopted on cluster-based topology of sensor network. The proposed schemes use partial key pre-distribution and symmetric cryptography techniques, and shows high resilience to different security attacks. Whereas one version of the proposed protocol uses shared partial keys in a cluster, the other version uses private partial keys. Both versions of the proposed key management scheme outperform other random key pre- distribution protocols in the sense that it requires lower space, lower communication overhead and offers very high session key candidates Key Establishment Partial Key Pre-Distribution Security Symmetric Cryptography Islam, Rafiqul verfasserin aut Kaosar, Mohammed verfasserin aut Enthalten in International journal of wireless networks and broadband technologies Hershey, Pa : IGI Global, 2011 4(2015), 1, Seite 29-44 Online-Ressource (DE-627)NLEJ244419671 (DE-600)2703700-9 2155-627X nnns volume:4 year:2015 number:1 pages:29-44 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijwnbt.2015010103 X:IGIG Verlag Deutschlandweit zugänglich http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijwnbt.2015010103&buylink=true Abstract ZDB-1-GIS GBV_NL_ARTICLE AR 4 2015 1 29-44 |
allfields_unstemmed |
10.4018/ijwnbt.2015010103 doi (DE-627)NLEJ251839613 (VZGNL)10.4018/ijwnbt.2015010103 DE-627 ger DE-627 rakwb eng Mamun, Quazi verfasserin aut Secured Communication Key Establishment for Cluster-Based Wireless Sensor Networks 2015 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier The resource-constraint nature of wireless sensor networks (WSNs) has caused the security one of biggest challenges. An efficient key management scheme is the pre-requisite to ensure security in WSN. In this paper the authors present two versions of a secured key management scheme adopted on cluster-based topology of sensor network. The proposed schemes use partial key pre-distribution and symmetric cryptography techniques, and shows high resilience to different security attacks. Whereas one version of the proposed protocol uses shared partial keys in a cluster, the other version uses private partial keys. Both versions of the proposed key management scheme outperform other random key pre- distribution protocols in the sense that it requires lower space, lower communication overhead and offers very high session key candidates Key Establishment Partial Key Pre-Distribution Security Symmetric Cryptography Islam, Rafiqul verfasserin aut Kaosar, Mohammed verfasserin aut Enthalten in International journal of wireless networks and broadband technologies Hershey, Pa : IGI Global, 2011 4(2015), 1, Seite 29-44 Online-Ressource (DE-627)NLEJ244419671 (DE-600)2703700-9 2155-627X nnns volume:4 year:2015 number:1 pages:29-44 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijwnbt.2015010103 X:IGIG Verlag Deutschlandweit zugänglich http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijwnbt.2015010103&buylink=true Abstract ZDB-1-GIS GBV_NL_ARTICLE AR 4 2015 1 29-44 |
allfieldsGer |
10.4018/ijwnbt.2015010103 doi (DE-627)NLEJ251839613 (VZGNL)10.4018/ijwnbt.2015010103 DE-627 ger DE-627 rakwb eng Mamun, Quazi verfasserin aut Secured Communication Key Establishment for Cluster-Based Wireless Sensor Networks 2015 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier The resource-constraint nature of wireless sensor networks (WSNs) has caused the security one of biggest challenges. An efficient key management scheme is the pre-requisite to ensure security in WSN. In this paper the authors present two versions of a secured key management scheme adopted on cluster-based topology of sensor network. The proposed schemes use partial key pre-distribution and symmetric cryptography techniques, and shows high resilience to different security attacks. Whereas one version of the proposed protocol uses shared partial keys in a cluster, the other version uses private partial keys. Both versions of the proposed key management scheme outperform other random key pre- distribution protocols in the sense that it requires lower space, lower communication overhead and offers very high session key candidates Key Establishment Partial Key Pre-Distribution Security Symmetric Cryptography Islam, Rafiqul verfasserin aut Kaosar, Mohammed verfasserin aut Enthalten in International journal of wireless networks and broadband technologies Hershey, Pa : IGI Global, 2011 4(2015), 1, Seite 29-44 Online-Ressource (DE-627)NLEJ244419671 (DE-600)2703700-9 2155-627X nnns volume:4 year:2015 number:1 pages:29-44 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijwnbt.2015010103 X:IGIG Verlag Deutschlandweit zugänglich http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijwnbt.2015010103&buylink=true Abstract ZDB-1-GIS GBV_NL_ARTICLE AR 4 2015 1 29-44 |
allfieldsSound |
10.4018/ijwnbt.2015010103 doi (DE-627)NLEJ251839613 (VZGNL)10.4018/ijwnbt.2015010103 DE-627 ger DE-627 rakwb eng Mamun, Quazi verfasserin aut Secured Communication Key Establishment for Cluster-Based Wireless Sensor Networks 2015 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier The resource-constraint nature of wireless sensor networks (WSNs) has caused the security one of biggest challenges. An efficient key management scheme is the pre-requisite to ensure security in WSN. In this paper the authors present two versions of a secured key management scheme adopted on cluster-based topology of sensor network. The proposed schemes use partial key pre-distribution and symmetric cryptography techniques, and shows high resilience to different security attacks. Whereas one version of the proposed protocol uses shared partial keys in a cluster, the other version uses private partial keys. Both versions of the proposed key management scheme outperform other random key pre- distribution protocols in the sense that it requires lower space, lower communication overhead and offers very high session key candidates Key Establishment Partial Key Pre-Distribution Security Symmetric Cryptography Islam, Rafiqul verfasserin aut Kaosar, Mohammed verfasserin aut Enthalten in International journal of wireless networks and broadband technologies Hershey, Pa : IGI Global, 2011 4(2015), 1, Seite 29-44 Online-Ressource (DE-627)NLEJ244419671 (DE-600)2703700-9 2155-627X nnns volume:4 year:2015 number:1 pages:29-44 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijwnbt.2015010103 X:IGIG Verlag Deutschlandweit zugänglich http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijwnbt.2015010103&buylink=true Abstract ZDB-1-GIS GBV_NL_ARTICLE AR 4 2015 1 29-44 |
language |
English |
source |
Enthalten in International journal of wireless networks and broadband technologies 4(2015), 1, Seite 29-44 volume:4 year:2015 number:1 pages:29-44 |
sourceStr |
Enthalten in International journal of wireless networks and broadband technologies 4(2015), 1, Seite 29-44 volume:4 year:2015 number:1 pages:29-44 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Key Establishment Partial Key Pre-Distribution Security Symmetric Cryptography |
isfreeaccess_bool |
false |
container_title |
International journal of wireless networks and broadband technologies |
authorswithroles_txt_mv |
Mamun, Quazi @@aut@@ Islam, Rafiqul @@aut@@ Kaosar, Mohammed @@aut@@ |
publishDateDaySort_date |
2015-01-01T00:00:00Z |
hierarchy_top_id |
NLEJ244419671 |
id |
NLEJ251839613 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">NLEJ251839613</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20231205144031.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">231128s2015 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/ijwnbt.2015010103</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)NLEJ251839613</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(VZGNL)10.4018/ijwnbt.2015010103</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Mamun, Quazi</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secured Communication Key Establishment for Cluster-Based Wireless Sensor Networks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The resource-constraint nature of wireless sensor networks (WSNs) has caused the security one of biggest challenges. An efficient key management scheme is the pre-requisite to ensure security in WSN. In this paper the authors present two versions of a secured key management scheme adopted on cluster-based topology of sensor network. The proposed schemes use partial key pre-distribution and symmetric cryptography techniques, and shows high resilience to different security attacks. Whereas one version of the proposed protocol uses shared partial keys in a cluster, the other version uses private partial keys. Both versions of the proposed key management scheme outperform other random key pre- distribution protocols in the sense that it requires lower space, lower communication overhead and offers very high session key candidates</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Key Establishment</subfield><subfield code="a">Partial Key</subfield><subfield code="a">Pre-Distribution</subfield><subfield code="a">Security</subfield><subfield code="a">Symmetric Cryptography</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Islam, Rafiqul</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kaosar, Mohammed</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">International journal of wireless networks and broadband technologies</subfield><subfield code="d">Hershey, Pa : IGI Global, 2011</subfield><subfield code="g">4(2015), 1, Seite 29-44</subfield><subfield code="h">Online-Ressource</subfield><subfield code="w">(DE-627)NLEJ244419671</subfield><subfield code="w">(DE-600)2703700-9</subfield><subfield code="x">2155-627X</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:4</subfield><subfield code="g">year:2015</subfield><subfield code="g">number:1</subfield><subfield code="g">pages:29-44</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijwnbt.2015010103</subfield><subfield code="m">X:IGIG</subfield><subfield code="x">Verlag</subfield><subfield code="z">Deutschlandweit zugänglich</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijwnbt.2015010103&buylink=true</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-GIS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_NL_ARTICLE</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">4</subfield><subfield code="j">2015</subfield><subfield code="e">1</subfield><subfield code="h">29-44</subfield></datafield></record></collection>
|
author |
Mamun, Quazi |
spellingShingle |
Mamun, Quazi misc Key Establishment Secured Communication Key Establishment for Cluster-Based Wireless Sensor Networks |
authorStr |
Mamun, Quazi |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)NLEJ244419671 |
format |
electronic Article |
delete_txt_mv |
keep |
author_role |
aut aut aut |
collection |
NL |
remote_str |
true |
illustrated |
Not Illustrated |
issn |
2155-627X |
topic_title |
Secured Communication Key Establishment for Cluster-Based Wireless Sensor Networks |
topic |
misc Key Establishment |
topic_unstemmed |
misc Key Establishment |
topic_browse |
misc Key Establishment |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
International journal of wireless networks and broadband technologies |
hierarchy_parent_id |
NLEJ244419671 |
hierarchy_top_title |
International journal of wireless networks and broadband technologies |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)NLEJ244419671 (DE-600)2703700-9 |
title |
Secured Communication Key Establishment for Cluster-Based Wireless Sensor Networks |
ctrlnum |
(DE-627)NLEJ251839613 (VZGNL)10.4018/ijwnbt.2015010103 |
title_full |
Secured Communication Key Establishment for Cluster-Based Wireless Sensor Networks |
author_sort |
Mamun, Quazi |
journal |
International journal of wireless networks and broadband technologies |
journalStr |
International journal of wireless networks and broadband technologies |
lang_code |
eng |
isOA_bool |
false |
recordtype |
marc |
publishDateSort |
2015 |
contenttype_str_mv |
txt |
container_start_page |
29 |
author_browse |
Mamun, Quazi Islam, Rafiqul Kaosar, Mohammed |
container_volume |
4 |
physical |
1 Online-Ressource |
format_se |
Elektronische Aufsätze |
author-letter |
Mamun, Quazi |
doi_str_mv |
10.4018/ijwnbt.2015010103 |
author2-role |
verfasserin |
title_sort |
secured communication key establishment for cluster-based wireless sensor networks |
title_auth |
Secured Communication Key Establishment for Cluster-Based Wireless Sensor Networks |
abstract |
The resource-constraint nature of wireless sensor networks (WSNs) has caused the security one of biggest challenges. An efficient key management scheme is the pre-requisite to ensure security in WSN. In this paper the authors present two versions of a secured key management scheme adopted on cluster-based topology of sensor network. The proposed schemes use partial key pre-distribution and symmetric cryptography techniques, and shows high resilience to different security attacks. Whereas one version of the proposed protocol uses shared partial keys in a cluster, the other version uses private partial keys. Both versions of the proposed key management scheme outperform other random key pre- distribution protocols in the sense that it requires lower space, lower communication overhead and offers very high session key candidates |
abstractGer |
The resource-constraint nature of wireless sensor networks (WSNs) has caused the security one of biggest challenges. An efficient key management scheme is the pre-requisite to ensure security in WSN. In this paper the authors present two versions of a secured key management scheme adopted on cluster-based topology of sensor network. The proposed schemes use partial key pre-distribution and symmetric cryptography techniques, and shows high resilience to different security attacks. Whereas one version of the proposed protocol uses shared partial keys in a cluster, the other version uses private partial keys. Both versions of the proposed key management scheme outperform other random key pre- distribution protocols in the sense that it requires lower space, lower communication overhead and offers very high session key candidates |
abstract_unstemmed |
The resource-constraint nature of wireless sensor networks (WSNs) has caused the security one of biggest challenges. An efficient key management scheme is the pre-requisite to ensure security in WSN. In this paper the authors present two versions of a secured key management scheme adopted on cluster-based topology of sensor network. The proposed schemes use partial key pre-distribution and symmetric cryptography techniques, and shows high resilience to different security attacks. Whereas one version of the proposed protocol uses shared partial keys in a cluster, the other version uses private partial keys. Both versions of the proposed key management scheme outperform other random key pre- distribution protocols in the sense that it requires lower space, lower communication overhead and offers very high session key candidates |
collection_details |
ZDB-1-GIS GBV_NL_ARTICLE |
container_issue |
1 |
title_short |
Secured Communication Key Establishment for Cluster-Based Wireless Sensor Networks |
url |
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijwnbt.2015010103 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijwnbt.2015010103&buylink=true |
remote_bool |
true |
author2 |
Islam, Rafiqul Kaosar, Mohammed |
author2Str |
Islam, Rafiqul Kaosar, Mohammed |
ppnlink |
NLEJ244419671 |
mediatype_str_mv |
c |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.4018/ijwnbt.2015010103 |
up_date |
2024-07-06T11:44:53.993Z |
_version_ |
1803829949492101120 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">NLEJ251839613</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20231205144031.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">231128s2015 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/ijwnbt.2015010103</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)NLEJ251839613</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(VZGNL)10.4018/ijwnbt.2015010103</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Mamun, Quazi</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secured Communication Key Establishment for Cluster-Based Wireless Sensor Networks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The resource-constraint nature of wireless sensor networks (WSNs) has caused the security one of biggest challenges. An efficient key management scheme is the pre-requisite to ensure security in WSN. In this paper the authors present two versions of a secured key management scheme adopted on cluster-based topology of sensor network. The proposed schemes use partial key pre-distribution and symmetric cryptography techniques, and shows high resilience to different security attacks. Whereas one version of the proposed protocol uses shared partial keys in a cluster, the other version uses private partial keys. Both versions of the proposed key management scheme outperform other random key pre- distribution protocols in the sense that it requires lower space, lower communication overhead and offers very high session key candidates</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Key Establishment</subfield><subfield code="a">Partial Key</subfield><subfield code="a">Pre-Distribution</subfield><subfield code="a">Security</subfield><subfield code="a">Symmetric Cryptography</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Islam, Rafiqul</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kaosar, Mohammed</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">International journal of wireless networks and broadband technologies</subfield><subfield code="d">Hershey, Pa : IGI Global, 2011</subfield><subfield code="g">4(2015), 1, Seite 29-44</subfield><subfield code="h">Online-Ressource</subfield><subfield code="w">(DE-627)NLEJ244419671</subfield><subfield code="w">(DE-600)2703700-9</subfield><subfield code="x">2155-627X</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:4</subfield><subfield code="g">year:2015</subfield><subfield code="g">number:1</subfield><subfield code="g">pages:29-44</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijwnbt.2015010103</subfield><subfield code="m">X:IGIG</subfield><subfield code="x">Verlag</subfield><subfield code="z">Deutschlandweit zugänglich</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijwnbt.2015010103&buylink=true</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-GIS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_NL_ARTICLE</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">4</subfield><subfield code="j">2015</subfield><subfield code="e">1</subfield><subfield code="h">29-44</subfield></datafield></record></collection>
|
score |
7.398053 |