Abstract | ||
---|---|---|
Hierarchical architectures are more and more widely adopted for organizing wireless sensor networks. In such architectures, middle-tier nodes take important roles, and pre- venting a malicious node from impersonating a middle-tier node and injecting falsified messages becomes critical. In this paper, we propose an energy efficient, distributed scheme to secure the multicast messages from the middle-tier nodes. Our scheme does not require a priori knowledge about the hierarchical relation between middle-tier nodes and lowest-tier nodes, and is adaptive to changes of this relation. Extensive simulations are conducted to evaluate our scheme, and the results show that the scheme is energy efficient. |
Year | DOI | Venue |
---|---|---|
2009 | 10.1109/ICCCN.2009.5235220 | ICCCN |
Keywords | Field | DocType |
power-efficient scheme,securing multicast,hierarchical sensor networks,computer architecture,data mining,energy efficient,a priori knowledge,sensor network,authentication,unicast,wireless sensor network,wireless sensor networks,power efficiency,base stations | Key distribution in wireless sensor networks,Base station,Authentication,Computer science,Efficient energy use,A priori and a posteriori,Computer network,Unicast,Multicast,Wireless sensor network,Distributed computing | Conference |
ISBN | Citations | PageRank |
Bad-remove | 3 | 0.39 |
References | Authors | |
17 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Jie Tian | 1 | 10 | 3.60 |
Guiling Wang | 2 | 573 | 34.93 |
Tan Yan | 3 | 295 | 24.12 |
Wensheng Zhang | 4 | 1415 | 80.30 |