A dynamic authentication scheme for hierarchical wireless sensor networks. Zhang, J., Shankaran, R., Orgun, M., Sattar, A., & Varadharajan, V. Volume 73 LNICST , 2012. abstract bibtex Sensor networks offer economically viable solutions for a wide variety of monitoring applications. In surveillance of critical infrastructure such as airports by sensor networks, security becomes a major concern. To resist against malicious attacks, secure communication between severely resource-constrained sensor nodes is necessary while maintaining scalability and flexibility to topology changes. A robust security solution for such networks must facilitate authentication of sensor nodes and the establishment of secret keys among nodes In this paper, we propose a decentralized authentication and key management framework for hierarchical ad hoc sensor networks. This scheme is light weight and energy aware and reduces the communication overhead. © 2012 Springer-Verlag Berlin Heidelberg.
@book{
title = {A dynamic authentication scheme for hierarchical wireless sensor networks},
type = {book},
year = {2012},
source = {Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST},
identifiers = {[object Object]},
keywords = {[Authentication, Wireless Sensor Networks]},
volume = {73 LNICST},
id = {7a0facd5-1f08-379c-b316-bc7a14750341},
created = {2017-02-09T03:48:46.000Z},
file_attached = {false},
profile_id = {99d2800d-478b-301c-a879-4ec8c5b094e5},
last_modified = {2017-03-25T00:40:59.198Z},
read = {false},
starred = {false},
authored = {true},
confirmed = {false},
hidden = {false},
citation_key = {Zhang2012a},
abstract = {Sensor networks offer economically viable solutions for a wide variety of monitoring applications. In surveillance of critical infrastructure such as airports by sensor networks, security becomes a major concern. To resist against malicious attacks, secure communication between severely resource-constrained sensor nodes is necessary while maintaining scalability and flexibility to topology changes. A robust security solution for such networks must facilitate authentication of sensor nodes and the establishment of secret keys among nodes In this paper, we propose a decentralized authentication and key management framework for hierarchical ad hoc sensor networks. This scheme is light weight and energy aware and reduces the communication overhead. © 2012 Springer-Verlag Berlin Heidelberg.},
bibtype = {book},
author = {Zhang, J. and Shankaran, R. and Orgun, M.A. and Sattar, A. and Varadharajan, V.}
}
Downloads: 0
{"_id":"JK8sjH5yRRzD6LYmz","bibbaseid":"zhang-shankaran-orgun-sattar-varadharajan-adynamicauthenticationschemeforhierarchicalwirelesssensornetworks-2012","downloads":0,"creationDate":"2017-02-10T00:22:32.186Z","title":"A dynamic authentication scheme for hierarchical wireless sensor networks","author_short":["Zhang, J.","Shankaran, R.","Orgun, M.","Sattar, A.","Varadharajan, V."],"year":2012,"bibtype":"book","biburl":null,"bibdata":{"title":"A dynamic authentication scheme for hierarchical wireless sensor networks","type":"book","year":"2012","source":"Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST","identifiers":"[object Object]","keywords":"[Authentication, Wireless Sensor Networks]","volume":"73 LNICST","id":"7a0facd5-1f08-379c-b316-bc7a14750341","created":"2017-02-09T03:48:46.000Z","file_attached":false,"profile_id":"99d2800d-478b-301c-a879-4ec8c5b094e5","last_modified":"2017-03-25T00:40:59.198Z","read":false,"starred":false,"authored":"true","confirmed":false,"hidden":false,"citation_key":"Zhang2012a","abstract":"Sensor networks offer economically viable solutions for a wide variety of monitoring applications. In surveillance of critical infrastructure such as airports by sensor networks, security becomes a major concern. To resist against malicious attacks, secure communication between severely resource-constrained sensor nodes is necessary while maintaining scalability and flexibility to topology changes. A robust security solution for such networks must facilitate authentication of sensor nodes and the establishment of secret keys among nodes In this paper, we propose a decentralized authentication and key management framework for hierarchical ad hoc sensor networks. This scheme is light weight and energy aware and reduces the communication overhead. © 2012 Springer-Verlag Berlin Heidelberg.","bibtype":"book","author":"Zhang, J. and Shankaran, R. and Orgun, M.A. and Sattar, A. and Varadharajan, V.","bibtex":"@book{\n title = {A dynamic authentication scheme for hierarchical wireless sensor networks},\n type = {book},\n year = {2012},\n source = {Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST},\n identifiers = {[object Object]},\n keywords = {[Authentication, Wireless Sensor Networks]},\n volume = {73 LNICST},\n id = {7a0facd5-1f08-379c-b316-bc7a14750341},\n created = {2017-02-09T03:48:46.000Z},\n file_attached = {false},\n profile_id = {99d2800d-478b-301c-a879-4ec8c5b094e5},\n last_modified = {2017-03-25T00:40:59.198Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {false},\n hidden = {false},\n citation_key = {Zhang2012a},\n abstract = {Sensor networks offer economically viable solutions for a wide variety of monitoring applications. In surveillance of critical infrastructure such as airports by sensor networks, security becomes a major concern. To resist against malicious attacks, secure communication between severely resource-constrained sensor nodes is necessary while maintaining scalability and flexibility to topology changes. A robust security solution for such networks must facilitate authentication of sensor nodes and the establishment of secret keys among nodes In this paper, we propose a decentralized authentication and key management framework for hierarchical ad hoc sensor networks. This scheme is light weight and energy aware and reduces the communication overhead. © 2012 Springer-Verlag Berlin Heidelberg.},\n bibtype = {book},\n author = {Zhang, J. and Shankaran, R. and Orgun, M.A. and Sattar, A. and Varadharajan, V.}\n}","author_short":["Zhang, J.","Shankaran, R.","Orgun, M.","Sattar, A.","Varadharajan, V."],"bibbaseid":"zhang-shankaran-orgun-sattar-varadharajan-adynamicauthenticationschemeforhierarchicalwirelesssensornetworks-2012","role":"author","urls":{},"keyword":["[Authentication","Wireless Sensor Networks]"],"downloads":0},"search_terms":["dynamic","authentication","scheme","hierarchical","wireless","sensor","networks","zhang","shankaran","orgun","sattar","varadharajan"],"keywords":["[authentication","wireless sensor networks]"],"authorIDs":[]}