Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2014, Article ID 134357, 8 pages
http://dx.doi.org/10.1155/2014/134357
Research Article

Key Updating Methods for Combinatorial Design Based Key Management Schemes

1College of Business Administration, Zhejiang Gongshang University, Hangzhou 310018, China
2Contemporary Business and Trade Research Center, Zhejiang Gongshang University, Hangzhou 310018, China
3Contemporary Business and Collaborative Innovation Research Center, Zhejiang Gongshang University, Hangzhou 310018, China
4College of Computer Science & Information Engineering, Zhejiang Gongshang University, Hangzhou 310018, China

Received 27 April 2014; Accepted 12 June 2014; Published 1 July 2014

Academic Editor: Gongfa Li

Copyright © 2014 Chonghuan Xu and Weinan Liu. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” IEEE Communications Magazine, vol. 40, no. 8, pp. 102–105, 2002. View at Publisher · View at Google Scholar · View at Scopus
  2. Y. Zhou, Y. Fang, and Y. Zhang, “Securing wireless sensor networks: a survey,” IEEE Communications Surveys and Tutorials, vol. 10, no. 3, pp. 6–28, 2008. View at Publisher · View at Google Scholar · View at Scopus
  3. L. Pang, L. Jiao, and Y. Wang, “Authentication and key negotiation protocol between two nodes of wireless sensor networks,” Chinese Journal of Sensors and Actuators, vol. 21, no. 8, pp. 1422–1426, 2008. View at Google Scholar · View at Scopus
  4. W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, “A key management scheme for wireless sensor networks using deployment knowledge,” in Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE INFOCOM '04), pp. 586–597, March 2004. View at Scopus
  5. C. Castelluccia and A. Spognardi, “RoK: a robust key pre-distribution protocol for multi-phase wireless sensor networks,” in Proceedings of the 3rd International Conference on Security and Privacy in Communications Networks (SecureComm '07), pp. 351–360, 2007. View at Publisher · View at Google Scholar
  6. D. Liu and P. Ning, “Establishing pairwise keys in distributed sensor networks,” in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), pp. 52–61, October 2003. View at Scopus
  7. W. Bechkit, Y. Challal, A. Bouabdallah, and V. Tarokh, “A highly scalable key pre-distribution scheme for wireless sensor networks,” IEEE Transactions on Wireless Communications, vol. 12, no. 2, pp. 948–959, 2013. View at Publisher · View at Google Scholar · View at Scopus
  8. D. R. Stinson and S. A. Vanstone, “A combinatorial approach to threshold schemes,” SIAM Journal on Discrete Mathematics, vol. 1, no. 2, pp. 230–236, 1988. View at Publisher · View at Google Scholar · View at MathSciNet
  9. D. R. Stinson, “Combinatorial characterizations of authentication codes,” Designs, Codes and Cryptography, vol. 2, no. 2, pp. 175–187, 1992. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  10. D. R. Stinson and T. Van Trung, “Some new results on key distribution patterns and broadcast encryption,” Designs, Codes and Cryptography, vol. 14, no. 3, pp. 261–279, 1998. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  11. B. Yener, Y. Ofek, and M. Yung, “Combinatorial design of congestion-free networks,” IEEE/ACM Transactions on Networking, vol. 5, no. 6, pp. 989–1000, 1997. View at Publisher · View at Google Scholar · View at Scopus
  12. Y. Song, A. Wool, and B. Yener, “Combinatorial design of multi-ring networks with combined routing and flow control,” Computer Networks, vol. 41, no. 2, pp. 247–267, 2003. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  13. C. J. Mitchell and F. C. Piper, “Key storage in secure networks,” Discrete Applied Mathematics, vol. 21, no. 3, pp. 215–228, 1988. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  14. S. A. Çamtepe and B. Yener, “Combinatorial design of key distribution mechanisms for wireless sensor networks,” IEEE/ACM Transactions on Networking, vol. 15, no. 2, pp. 346–358, 2007. View at Publisher · View at Google Scholar · View at Scopus
  15. S. Ruj and B. Roy, “Key predistribution using combinatorial designs for grid-group deployment scheme in wireless sensor networks,” ACM Transactions on Sensor Networks, vol. 6, no. 1, article 4, 2009. View at Publisher · View at Google Scholar · View at Scopus
  16. S. Ruj, A. Nayak, and I. Stojmenovic, “Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs,” in Proceedings of the IEEE INFOCOM, pp. 326–330, Shanghai, China, April 2011. View at Publisher · View at Google Scholar · View at Scopus
  17. T. Choi, H. B. Acharya, and M. G. Gouda, “The best keying protocol for sensor networks,” in Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM '11), pp. 1–6, June 2011. View at Publisher · View at Google Scholar · View at Scopus
  18. G. Anastasi, M. Conti, M. Di Francesco, and A. Passarella, “Energy conservation in wireless sensor networks: a survey,” Ad Hoc Networks, vol. 7, no. 3, pp. 537–568, 2009. View at Publisher · View at Google Scholar · View at Scopus
  19. S. Han, B. Tian, Y. Zhang, and J. Hu, “An efficient self-healing key distribution scheme with constant-size personal keys for wireless sensor networks,” in Proceedings of the IEEE International Conference on Communications (ICC '10), pp. 1–5, Cape Town, South Africa, May 2010. View at Publisher · View at Google Scholar · View at Scopus
  20. B. Tian, S. Han, S. Parvin, J. Hu, and S. Das, “Self-healing key distribution schemes for wireless networks: a survey,” The Computer Journal, vol. 54, no. 4, pp. 549–569, 2011. View at Publisher · View at Google Scholar · View at Scopus