Mohammad Rezaeirad, Sahar Mazloom, Mahdi Orooji, D. Perkins, M. Bayoumi
{"title":"A cluster-based key management framework for resource constraint networks","authors":"Mohammad Rezaeirad, Sahar Mazloom, Mahdi Orooji, D. Perkins, M. Bayoumi","doi":"10.1109/IRI.2014.7051919","DOIUrl":null,"url":null,"abstract":"In this work, we propose a Cluster-based framework to be used for a resource constraint network. The proposed framework includes any pre-distribution key establishment schemes. It allows mobility and provides efficiency and security. We provide two instantiations to support our claim that the proposed framework improves security and scalability of the used keying establishment schemes. We develop analytical models and conduct extensive simulations to evaluate the security and performance of the proposed framework under different scenarios.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IRI.2014.7051919","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In this work, we propose a Cluster-based framework to be used for a resource constraint network. The proposed framework includes any pre-distribution key establishment schemes. It allows mobility and provides efficiency and security. We provide two instantiations to support our claim that the proposed framework improves security and scalability of the used keying establishment schemes. We develop analytical models and conduct extensive simulations to evaluate the security and performance of the proposed framework under different scenarios.