You are not logged in.

Matrix-based pairwise key establishment with pre and post deployment knowledge for wireless mesh networks

Zhang, Yuexin, Xu, Li and Huang, Xinyi 2013, Matrix-based pairwise key establishment with pre and post deployment knowledge for wireless mesh networks, in IMIS 2013 : Proceedings of the 7th Innovative Mobile and Internet Services in Ubiquitous Computing, IEEE, Piscataway, N.J., pp. 153-158, doi: 10.1109/IMIS.2013.34.

Attached Files
Name Description MIMEType Size Downloads

Title Matrix-based pairwise key establishment with pre and post deployment knowledge for wireless mesh networks
Author(s) Zhang, Yuexin
Xu, Li
Huang, Xinyi
Conference name Innovative Mobile and Internet Services in Ubiquitous Computing. Conference (7th : 2013 : Taichung, Taiwan)
Conference location Taichung, Taiwan
Conference dates 3-5 Jul. 2013
Title of proceedings IMIS 2013 : Proceedings of the 7th Innovative Mobile and Internet Services in Ubiquitous Computing
Editor(s) [Unknown]
Publication date 2013
Conference series Innovative Mobile and Internet Services in Ubiquitous Computing Conference
Start page 153
End page 158
Total pages 6
Publisher IEEE
Place of publication Piscataway, N.J.
Keyword(s) pairwise key
matrix
pre and post deployment knowledge
wireless mesh networks
wireless sensor networks
Summary The nature of wireless transmission leads to vulnerabilities to many malicious activities, and communication in wireless mesh networks (WMNs) must be protected by proper security measures. This paper focuses on symmetric pair wise key establishment and presents a new matrix-based pair wise key establishment scheme for mesh clients. In WMNs, mesh routers are much more powerful than mesh clients, both in communication and computation. By taking advantage of this heterogeneity, our new scheme delegates energy-consuming operations to mesh routers when establishing pair wise keys for mesh clients. Additionally, neighbor mesh clients in our scheme can directly establish pair wise keys with significantly reduced communication and storage costs, due to the use of both pre and post deployment knowledge.
Language eng
DOI 10.1109/IMIS.2013.34
Field of Research 109999 Technology not elsewhere classified
Socio Economic Objective 970110 Expanding Knowledge in Technology
HERDC Research category E1.1 Full written paper - refereed
Copyright notice ©2013, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30064212

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 36 Abstract Views, 1 File Downloads  -  Detailed Statistics
Created: Wed, 11 Jun 2014, 12:49:18 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.