24小时热门版块排行榜    

查看: 390  |  回复: 1

computer286

木虫 (小有名气)

[求助] 求帮忙查论文是否EI收录 已有1人参与

题目:An improved key pre-distribution scheme based on  the security level classification of keys for wireless sensor networks
期刊:Int. J. Information and Computer Security
日期:Vol. 12, No. 1, pp.40–52, 2020
回复此楼

» 猜你喜欢

已阅   回复此楼   关注TA 给TA发消息 送TA红花 TA的回帖

ltxmfx

新虫 (初入文坛)

【答案】应助回帖

★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ...
感谢参与,应助指数 +1
computer286: 金币+100 2020-03-15 19:35:58
祝贺你,已经收录了,收录信息如下:
An improved key pre-distribution scheme based on the security level classification of keys for wireless sensor networks
Accession number: 20195007825392
Authors: Zhang, Jianmin 1   ; Li, Hua 1   ; Li, Jian 1  
Author affiliation : 1 College of Computer, Henan Institute of Engineering, Zhengzhou; 451191, China
Corresponding author: Zhang, Jianmin (zjm1996@163.com)
Source title: International Journal of Information and Computer Security
Abbreviated source title: Int. J. Inf. Comput. Secur.
Volume: 12
Issue: 1
Issue date: 2020
Publication Year: 2020
Pages: 40-52
Language: English
ISSN: 17441765
E-ISSN: 17441773
Document type: Journal article (JA)
Publisher: Inderscience Enterprises Ltd.
Abstract: The use of wireless sensor networks (WSNs) in any real-world application requires a certain level of security. To provide security of operations such as message exchange, key management schemes have to be well adapted to the particularities of WSNs. Unfortunately, the resource limitation of sensor nodes poses a great challenge for designing an efficient and effective key establishment scheme for WSNs. This paper proposes a novel key management scheme. In the proposed scheme, the pre-distributed keys in nodes are classified different security levels and the higher security level of the pre-distributed key in compromised nodes will disclose the fewer pre-distributed keys in the uncompromised nodes than that of the lower security level of the pre-distributed key. The proposed scheme is analysed based on connectivity, resistance against attacks, memory consumption and communication overhead. Simulation results confirm that the proposed scheme has a good resilience against node compromising attacks compared to the existing schemes.
Copyright © 2020 Inderscience Enterprises Ltd.
Number of references: 21
Main heading: Network security
Controlled terms: Hash functions -  Sensor nodes -  Wireless sensor networks
Uncontrolled terms: Communication overheads -  Key establishment schemes -  Key management schemes -  Key pre-distribution -  Resource limitations -  Security level -  Wireless sensor network (WSNs) -  WSNs
Classification code: 722 Computer Systems and Equipment  -  722.3 Data Communication, Equipment and Techniques  -  723 Computer Software, Data Handling and Applications
DOI: 10.1504/IJICS.2020.103999
Database: Compendex
2楼2020-03-15 17:27:46
已阅   回复此楼   关注TA 给TA发消息 送TA红花 TA的回帖
相关版块跳转 我要订阅楼主 computer286 的主题更新
信息提示
请填处理意见