E-mail

E-mail a Wiley Online Library Link

Chih-Hung Chao, Ching-Fang Yang, Po-Ting Lin and Jung-Shian Li Novel distributed key revocation scheme for wireless sensor networks Security and Communication Networks 6

Version of Record online: 18 JAN 2013 | DOI: 10.1002/sec.707

Thumbnail image of graphical abstract

The paper proposed that any node identified as having a malicious behaviour by t or more sensor nodes is categorized as a compromised node, and its keys are immediately revoked from the entire network. The proposed scheme not only satisfies the rigorous definition of a distributed key revocation protocol but also yields a significant improvement over Chan's revocation scheme in terms of a lower storage space requirement, a reduced communication overhead, and a lower computational cost.

Complete the form below and we will send an e-mail message containing a link to the selected article on your behalf

Required = Required Field

SEARCH