﻿<?xml version="1.0" encoding="utf-8"?>
<ArticleSet>
  <ARTICLE>
    <Journal>
      <PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName>
      <JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle>
      <ISSN>2322-1437</ISSN>
      <Volume>8</Volume>
      <Issue>29</Issue>
      <PubDate PubStatus="epublish">
        <Year>2020</Year>
        <Month>7</Month>
        <Day>19</Day>
      </PubDate>
    </Journal>
    <ArticleTitle>Using Residual Design for Key Management in Hierarchical Wireless Sensor Networks</ArticleTitle>
    <VernacularTitle>Using Residual Design for Key Management in Hierarchical Wireless Sensor Networks</VernacularTitle>
    <FirstPage>53</FirstPage>
    <LastPage>61</LastPage>
    <ELocationID EIdType="doi">10.7508/jist.2020.01.006</ELocationID>
    <Language>en</Language>
    <AuthorList>
      <Author>
        <FirstName>Vahid</FirstName>
        <LastName>Modiri</LastName>
        <Affiliation>Science and research Islamic Azad University</Affiliation>
      </Author>
      <Author>
        <FirstName>Hamid</FirstName>
        <LastName>Haj Seyyed Javadi</LastName>
        <Affiliation>Shahed University</Affiliation>
      </Author>
      <Author>
        <FirstName>Amir Masoud </FirstName>
        <LastName>Rahmani</LastName>
        <Affiliation>Science and Research Branch,  Islamic Azad University</Affiliation>
      </Author>
      <Author>
        <FirstName>Mohaddese</FirstName>
        <LastName>Anzani</LastName>
        <Affiliation>Shahed University</Affiliation>
      </Author>
    </AuthorList>
    <History PubStatus="received">
      <Year>2019</Year>
      <Month>12</Month>
      <Day>11</Day>
    </History>
    <Abstract>Combinatorial designs are powerful structures for key management in wireless sensor networks to address good connectivity and also security against external attacks in large scale networks. Many researchers have used key pre-distribution schemes using combinatorial structures in which key-rings, are pre-distributed to each sensor node before deployment in a real environment. Regarding the restricted resources, key distribution is a great engagement and challenging issue in providing sufficient security in wireless sensor networks. To provide secure communication, a unique key should be found from their stored key-rings. Most of the key pre-distribution protocols based on public-key mechanisms could not support highly scalable networks due to their key storage overhead and communication cost that linearly increasing. In this paper, we introduce a new key distribution approach for hierarchical clustered wireless sensor networks. Each cluster has a construction that contains new points or that reinforces and builds upon similar ideas of their head clusters. Based on Residual Design as a powerful algebraic combinatorial architecture and hierarchical network model, our approach guarantees good connectivity between sensor nodes and also cluster heads. Compared with similar existing schemes, our approach can provide sufficient security no matter if the cluster head or normal sensor node is compromised</Abstract>
    <ObjectList>
      <Object Type="Keyword">
        <Param Name="Value">Wireless sensor networks;</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">Key pre-distribution;</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">Residual Design;</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">Hierarchical network model;</Param>
      </Object>
    </ObjectList>
    <ArchiveCopySource DocType="Pdf">http://jist.ir/en/Article/Download/15399</ArchiveCopySource>
  </ARTICLE>
</ArticleSet>