Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2016, Article ID 5071617, 15 pages
http://dx.doi.org/10.1155/2016/5071617
Research Article

Disjoint Key Establishment Protocol for Wireless Sensor and Actor Networks

1Department of Computer Science, National University of Modern Languages, Islamabad 44000, Pakistan
2Department of Computer Science and Software Engineering, International Islamic University, Islamabad 44000, Pakistan
3College of Computer and Information Sciences, King Saud University, Riyadh 12372, Saudi Arabia
4Department of Electrical & Computer Engineering, College of Engineering, Dhofar University, 211 Salalah, Oman

Received 25 March 2016; Accepted 5 May 2016

Academic Editor: Fanli Meng

Copyright © 2016 AtaUllah Ghafoor et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network survey,” Computer Networks, vol. 52, no. 12, pp. 2292–2330, 2008. View at Publisher · View at Google Scholar · View at Scopus
  2. I. F. Akyildiz and I. H. Kasimoglu, “Wireless sensor and actor networks: research challenges,” Ad Hoc Networks, vol. 2, no. 4, pp. 351–367, 2004. View at Publisher · View at Google Scholar · View at Scopus
  3. H. Salarian, K.-W. Chin, and F. Naghdy, “Coordination in wireless sensor–actuator networks: a survey,” Journal of Parallel and Distributed Computing, vol. 72, no. 7, pp. 856–867, 2012. View at Publisher · View at Google Scholar · View at Scopus
  4. M. Imran, M. A. Alnuem, W. Alsalih, and M. Younis, “A novel wireless sensor and actor network framework for autonomous monitoring and maintenance of lifeline infrastructures,” in Proceedings of the IEEE International Conference on Communications (ICC '12), pp. 6484–6488, Ottawa, Canada, June 2012. View at Publisher · View at Google Scholar · View at Scopus
  5. J. Sen, “A survey on wireless sensor network security,” International Journal of Communication Networks and Information Security, vol. 1, no. 2, pp. 59–78, 2009. View at Google Scholar · View at Scopus
  6. Y. Zhou, Y. Fang, and Y. Zhang, “Securing wireless sensor networks: a survey,” IEEE Communications Surveys & Tutorials, vol. 10, no. 3, pp. 6–28, 2008. View at Publisher · View at Google Scholar · View at Scopus
  7. P. Sundaram, M. Dharshini, and T. Gnanasekaran, “The unceasing detection of adjoining nodes, its connectivity, weakness impact on wireless sensor networks and actor networks,” International Journal of Innovative Research in Science, Engineering and Technology, vol. 3, no. 1, pp. 1346–1362, 2014. View at Google Scholar
  8. J. Du, E. Kranakis, and A. Nayak, “Distributed key establishment in disruption tolerant location based social wireless sensor and actor network,” in Proceedings of the 9th Annual Communication Networks and Services Research Conference (CNSR '11), pp. 109–116, IEEE, Ottawa, Canada, May 2011. View at Publisher · View at Google Scholar · View at Scopus
  9. R. Blom, “An optimal class of symmetric key generation systems,” in Proceedings of the EUROCRYPT 84 Workshop on Advances in Cryptology: Theory and Application of Cryptographic Techniques, pp. 335–338, 1985.
  10. S. Sukumar, “Computational analysis of modified Blom's scheme,” in Proceedings of the Computing Research Repository (CoRR '13), 2013.
  11. A. Parakh and S. Kak, “Matrix based key agreement algorithms for sensor networks,” in Proceedings of the 5th IEEE International Conference on Advanced Networks and Telecommunication Systems (ANTS '11), December 2011. View at Publisher · View at Google Scholar · View at Scopus
  12. L.-C. Wuu, C.-H. Hung, and C.-M. Chang, “Quorum-based key management scheme in wireless sensor networks,” in Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication (ICUIMC '12), February 2012. View at Publisher · View at Google Scholar · View at Scopus
  13. J. Qadir and O. Hasan, “Applying formal methods to networking: theory, techniques, and applications,” IEEE Communications Surveys and Tutorials, vol. 17, no. 1, pp. 256–291, 2015. View at Publisher · View at Google Scholar · View at Scopus
  14. M. Burrows, M. Abad, and M. Needham, “A logic of authentication,” Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, vol. 426, no. 1871, pp. 233–271, 1989. View at Publisher · View at Google Scholar
  15. A. Datta, A. Derek, J. C. Mitchell, and A. Roy, “Protocol composition logic (PCL),” in Electronic Notes in Theoretical Computer Science, vol. 172, pp. 311–358, 2007. View at Google Scholar
  16. A. Rubin and P. Honeyman, “Nonmonotonic cryptographic protocols,” in Proceedings of the Computer Security Foundations Workshop (CSFW '94), pp. 100–116, Franconia, NH, USA, 1994. View at Publisher · View at Google Scholar
  17. Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, “A survey of key management schemes in wireless sensor networks,” Computer Communications, vol. 30, no. 11-12, pp. 2314–2341, 2007. View at Publisher · View at Google Scholar · View at Scopus
  18. M. A. Simplício Jr., P. S. L. M. Barreto, C. B. Margi, and T. C. M. B. Carvalho, “A survey on key management mechanisms for distributed Wireless Sensor Networks,” Computer Networks, vol. 54, no. 15, pp. 2591–2612, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  19. W. H. Press, B. Flannery, S. A. Teukolsky, and W. T. Vetterling, Vandermonde Matrices and Toeplitz Matrices. 2.8 in Numerical Recipes in FORTRAN: The Art of Scientific Computing, Cambridge University Press, Cambridge, UK, 1992.
  20. E. Khan, E. Gabidulin, B. Honary, and H. Ahmed, “Matrix-based memory efficient symmetric key generation and pre-distribution scheme for wireless sensor networks,” IET Wireless Sensor Systems, vol. 2, no. 2, pp. 108–114, 2012. View at Publisher · View at Google Scholar · View at Scopus
  21. W. Bechkit, Y. Challal, A. Bouabdallah, and V. Tarokh, “A highly scalable key pre-distribution scheme for wireless sensor networks,” IEEE Transactions on Wireless Communications, vol. 12, no. 2, pp. 948–959, 2013. View at Publisher · View at Google Scholar · View at Scopus
  22. H. Dai and H. Xu, “Key predistribution approach in wireless sensor networks using LU matrix,” IEEE Sensors Journal, vol. 10, no. 8, pp. 1399–1409, 2010. View at Publisher · View at Google Scholar · View at Scopus
  23. J. Wan, J. Liu, Z. Shao, A. V. Vasilakos, M. Imran, and K. Zhou, “Mobile crowd sensing for traffic prediction in internet of vehicles,” Sensors, vol. 16, no. 1, article 88, 2016. View at Publisher · View at Google Scholar · View at Scopus
  24. A. Derhab, A. Bouras, M. R. Senouci, and M. Imran, “Fortifying intrusion detection systems in dynamic Ad Hoc and wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 2014, Article ID 608162, 15 pages, 2014. View at Publisher · View at Google Scholar · View at Scopus
  25. M. Imran and N. A. Zafar, “Formal specification and validation of a hybrid connectivity restoration algorithm for wireless sensor and actor networks,” Sensors, vol. 12, no. 9, pp. 11754–11781, 2012. View at Publisher · View at Google Scholar · View at Scopus
  26. A. Ghafoor, M. Sher, M. Imran, and A. Derhab, “Secure key distribution using fragmentation and assimilation in wireless sensor and actor networks,” International Journal of Distributed Sensor Networks, vol. 2015, Article ID 542856, 13 pages, 2015. View at Publisher · View at Google Scholar · View at Scopus
  27. P. Kumar, A. J. Choudhury, M. Sain, S.-G. Lee, and H.-J. Lee, “RUASN: a robust user authentication framework for wireless sensor networks,” Sensors, vol. 11, no. 5, pp. 5020–5046, 2011. View at Publisher · View at Google Scholar · View at Scopus