Redundancy in Key Management for WSNs

Security in wireless sensor networks is commonly based on symmetric encryption and requires key-management systems to establish and exchange secret keys. A constraint that is common to many key-management approaches is an upper bound to the total number of nodes in the network. An example is represe...

Full description

Bibliographic Details
Main Authors: Filippo Gandino, Bartolomeo Montrucchio, Maurizio Rebaudengo
Format: Article
Language:English
Published: MDPI AG 2018-12-01
Series:Cryptography
Subjects:
WSN
Online Access:https://www.mdpi.com/2410-387X/2/4/40