A survey on key management mechanisms for distributed wireless sensor networks

MA Simplício Jr, PSLM Barreto, CB Margi… - Computer …, 2010 - Elsevier
Wireless Sensor Networks (WSNs) have a vast field of applications, including deployment in
hostile environments. Thus, the adoption of security mechanisms is fundamental. However …

A survey of key management schemes in multi-phase wireless sensor networks

ML Messai, H Seba - Computer Networks, 2016 - Elsevier
Abstract Wireless Sensor Networks (WSNs) are the enabling technology for smart cities,
intelligent cars and transportation systems, precision agriculture, animal tracking, and all …

A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks

AK Das - International journal of information security, 2012 - Springer
Several symmetric-key distribution mechanisms are proposed in the literature, but most of
them are not scalable or they are vulnerable to a small number of captured nodes. In this …

A dynamic key management paradigm for secure wireless ad hoc network communications

A Singh, AN Tentu… - International Journal of …, 2021 - inderscienceonline.com
Mobile ad hoc network (MANET) is an autonomous system of mobile nodes, which are
connected each other through wireless links. A mobile ad hoc network (MANET) is a type of …

Utilizing hash graphs for key distribution for mobile and replaceable interconnected sensors in the IoT context

A Levi, S Sarimurat - Ad Hoc Networks, 2017 - Elsevier
In most general terms, Internet of Thing (IoT) applications and networks contain
interconnected equipment, which are mostly resource constrained. Sensor nodes with …

Increasing Resiliency in Multi-phase Wireless Sensor Networks: Generationwise Key Predistribution Approach: This work is an extended version of Ergun, M., Levi, A …

M Ergun, A Levi, E Savas - The Computer Journal, 2011 - ieeexplore.ieee.org
In wireless sensor networks (WSNs), sensor nodes eventually die due to battery depletion.
WSNs in which new nodes are periodically redeployed with certain intervals, called …

Deployment based attack resistant key distribution with non overlap** key pools in WSN

P Ahlawat, M Dave - Wireless Personal Communications, 2018 - Springer
Many current key management schemes do not effectively consider the attack probability
and assume it to be same for every sensor node. However, for some applications like …

Self‐healing wireless sensor networks

A Miyaji, K Omote - Concurrency and Computation: Practice …, 2015 - Wiley Online Library
Availability is very important for long‐term use of wireless sensor networks (WSNs),
assuming the presence of an attacker. It is thus important to achieve secure communication …

RPoK: A strongly resilient polynomial-based random key pre-distribution scheme for multiphase wireless sensor networks

H Ito, A Miyaji, K Omote - 2010 IEEE Global …, 2010 - ieeexplore.ieee.org
In this paper, we propose a strongly resilient polynomial-based random key pre-distribution
scheme for multiphase wireless sensor networks (RPoK): a private sub-key is not directly …

AdaPtive and rObust Key pre‐distribution for multi‐phase IoT networks

ML Messai - International Journal of Communication Systems, 2024 - Wiley Online Library
Summary Internet of Things (IoT) networks continue to be deployed and play a crucial role in
our daily life. Thus, ensuring their security is of utmost importance. This necessitates the use …