[HTML][HTML] Ahkm: an improved class of hash based key management mechanism with combined solution for single hop and multi hop nodes in iot
The extensive growth of the Internet of Things (IoT) devices leads to the evolution of the
broad range of smart applications in numerous fields such as smart home, wearable …
broad range of smart applications in numerous fields such as smart home, wearable …
An attack model based highly secure key management scheme for wireless sensor networks
Wireless sensor network (WSN) security is a critical issue due to its inherent characteristic
and unattended operation which makes it vulnerable to many attacks. Key management …
and unattended operation which makes it vulnerable to many attacks. Key management …
[HTML][HTML] An attack resistant key predistribution scheme for wireless sensor networks
Most of the key management schemes do not consider the attacking behavior of the
adversary making such schemes less practical in real world. By knowing the adversarial …
adversary making such schemes less practical in real world. By knowing the adversarial …
A multi objective optimization modeling in WSN for enhancing the attacking efficiency of node capture attack
Node capture attacks compromise the integrity and confidentiality of networks by capturing
nodes within them and obtaining cryptographic keys through wireless sensor network links …
nodes within them and obtaining cryptographic keys through wireless sensor network links …
[HTML][HTML] Unsupervised machine learning based key management in wireless sensor networks
In distributed sensor applications, the secured infrastructure plays a major role in processing
and transmission of data. The data transfer in wireless sensor network (WSN) is equipped …
and transmission of data. The data transfer in wireless sensor network (WSN) is equipped …
Deployment based attack resistant key distribution with non overlap** key pools in WSN
Many current key management schemes do not effectively consider the attack probability
and assume it to be same for every sensor node. However, for some applications like …
and assume it to be same for every sensor node. However, for some applications like …
A cost‐effective attack matrix based key management scheme with dominance key set for wireless sensor network security
To guarantee the proper functionality of wireless sensor network even in the presence of the
potential threats, a well‐designed key management scheme is very important. The …
potential threats, a well‐designed key management scheme is very important. The …
A trust-based secure hybrid framework for routing in WSN
Most of the routing protocols designed for wireless sensor network (WSN) still suffer from
some disadvantages such as high path breakage ratio, low throughput, limited energy, end …
some disadvantages such as high path breakage ratio, low throughput, limited energy, end …
Lightweight two-factor authentication protocol and session key generation scheme for WSN in IoT deployment
In recent years, Wireless sensor networks (WSN) are extensively exploited in terms of their
enormous applicability and are widely used from mere public branches like hospitals, banks …
enormous applicability and are widely used from mere public branches like hospitals, banks …
A hybrid key pre-distribution scheme for wireless sensor networks
C **ong, S Li, L Liu, R Li, Y ** - Journal of Physics: Conference …, 2019 - iopscience.iop.org
Key management in wireless sensor networks (WSNs) is the basic service for deploying
security policies. In this paper, we combine q-composite scheme with polynomial scheme to …
security policies. In this paper, we combine q-composite scheme with polynomial scheme to …