{"title":"A Novel Key Management of Two-Tier Dissemination for Wireless Sensor Network","authors":"Chin-Ling Chen, Yu-Ting Tsai, Tzay-Farn Shih","doi":"10.1109/IMIS.2012.55","DOIUrl":null,"url":null,"abstract":"This paper proposes a novel key management of two-tier dissemination for wireless sensor network. In our scheme, a sensor node is selected to be a cluster node in each grid. The responsibility of cluster node is to aggregate the events from sensor node and respond to base station. The base station obtains the occurred event information from its cluster nodes. Based on pre-deployment position to set the routing table for communication, which would allow data transfer between nodes, and transmits it back to the base station. The authentication mechanism of cluster nodes and base station is proposed in this paper.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMIS.2012.55","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
This paper proposes a novel key management of two-tier dissemination for wireless sensor network. In our scheme, a sensor node is selected to be a cluster node in each grid. The responsibility of cluster node is to aggregate the events from sensor node and respond to base station. The base station obtains the occurred event information from its cluster nodes. Based on pre-deployment position to set the routing table for communication, which would allow data transfer between nodes, and transmits it back to the base station. The authentication mechanism of cluster nodes and base station is proposed in this paper.