[HTML][HTML] Ahkm: an improved class of hash based key management mechanism with combined solution for single hop and multi hop nodes in iot

ABF Khan, G Anandharaj - Egyptian Informatics Journal, 2021‏ - Elsevier
The extensive growth of the Internet of Things (IoT) devices leads to the evolution of the
broad range of smart applications in numerous fields such as smart home, wearable …

An attack model based highly secure key management scheme for wireless sensor networks

P Ahlawat, M Dave - Procedia Computer Science, 2018‏ - Elsevier
Wireless sensor network (WSN) security is a critical issue due to its inherent characteristic
and unattended operation which makes it vulnerable to many attacks. Key management …

[HTML][HTML] An attack resistant key predistribution scheme for wireless sensor networks

P Ahlawat, M Dave - Journal of King Saud University-Computer and …, 2021‏ - Elsevier
Most of the key management schemes do not consider the attacking behavior of the
adversary making such schemes less practical in real world. By knowing the adversarial …

A multi objective optimization modeling in WSN for enhancing the attacking efficiency of node capture attack

P Ahlawat, R Bathla - … Journal of System Assurance Engineering and …, 2023‏ - Springer
Node capture attacks compromise the integrity and confidentiality of networks by capturing
nodes within them and obtaining cryptographic keys through wireless sensor network links …

[HTML][HTML] Unsupervised machine learning based key management in wireless sensor networks

D Sowmyadevi, I Shanmugapriya - Measurement: Sensors, 2023‏ - Elsevier
In distributed sensor applications, the secured infrastructure plays a major role in processing
and transmission of data. The data transfer in wireless sensor network (WSN) is equipped …

Deployment based attack resistant key distribution with non overlap** key pools in WSN

P Ahlawat, M Dave - Wireless Personal Communications, 2018‏ - Springer
Many current key management schemes do not effectively consider the attack probability
and assume it to be same for every sensor node. However, for some applications like …

A cost‐effective attack matrix based key management scheme with dominance key set for wireless sensor network security

P Ahlawat, M Dave - International Journal of Communication …, 2018‏ - Wiley Online Library
To guarantee the proper functionality of wireless sensor network even in the presence of the
potential threats, a well‐designed key management scheme is very important. The …

A trust-based secure hybrid framework for routing in WSN

K Saini, P Ahlawat - Recent Findings in Intelligent Computing Techniques …, 2019‏ - Springer
Most of the routing protocols designed for wireless sensor network (WSN) still suffer from
some disadvantages such as high path breakage ratio, low throughput, limited energy, end …

Lightweight two-factor authentication protocol and session key generation scheme for WSN in IoT deployment

A Attkan, P Ahlawat - Advances in Cybernetics, Cognition, and Machine …, 2020‏ - Springer
In recent years, Wireless sensor networks (WSN) are extensively exploited in terms of their
enormous applicability and are widely used from mere public branches like hospitals, banks …

A hybrid key pre-distribution scheme for wireless sensor networks

C **ong, S Li, L Liu, R Li, Y ** - Journal of Physics: Conference …, 2019‏ - iopscience.iop.org
Key management in wireless sensor networks (WSNs) is the basic service for deploying
security policies. In this paper, we combine q-composite scheme with polynomial scheme to …