《Table1 Notations and definitions》

《Table1 Notations and definitions》   提示:宽带有限、当前游客访问压缩模式
本系列图表出处文件名:随高清版一同展现
《Study on key management scheme for heterogeneous wireless sensor networks》


  1. 获取 高清版本忘记账户?点击这里登录
  1. 下载图表忘记账户?点击这里登录

Assume that there is no shared-key between node u and 1-d-hop neighbor nodes,where d is a system parameter.A request message containing node u’s ID will be sent to BS by CH;then,BS sends a corresponding key encrypted by KHto CH.After acquiring the key from BS,for each pair of neighbor nodes u and v,a pair-wise key Ku,vwill be generated and unicasted to u and v,noted as CH→u:{Ku,v}Ku,CH→v:{Ku,v}Kv,so that node u and v will acquire the sharedkey Ku,vand can communicate securely.