A blockchain-based secure key management scheme with trustworthiness in DWSNs
Dynamic wireless sensor networks (DWSNs) as an important means of industrial data
collection are a key part of industrial Internet of Things (IIoT), where security and reliability …
collection are a key part of industrial Internet of Things (IIoT), where security and reliability …
Effective key management in dynamic wireless sensor networks
Recently, wireless sensor networks (WSNs) have been deployed for a wide variety of
applications, including military sensing and tracking, patient status monitoring, traffic flow …
applications, including military sensing and tracking, patient status monitoring, traffic flow …
A decentralized blockchain-based key management protocol for heterogeneous and dynamic IoT devices
MA Kandi, DE Kouicem, M Doudou, H Lakhlef… - Computer …, 2022 - Elsevier
Secure communication is one of the main challenges that are slowing down the
development of the Internet of Things (IoT). Key Management (KM) is particularly a difficult …
development of the Internet of Things (IoT). Key Management (KM) is particularly a difficult …
A secure communication protocol for drones and smart objects
In many envisioned drone-based applications, drones will communicate with many different
smart objects, such as sensors and embedded devices. Securing such communications …
smart objects, such as sensors and embedded devices. Securing such communications …
A versatile Key Management protocol for secure Group and Device-to-Device Communication in the Internet of Things
MA Kandi, H Lakhlef, A Bouabdallah… - Journal of Network and …, 2020 - Elsevier
Abstract The Internet of Things (IoT) is a network made up of a large number of devices that
collaborate to provide various service for the benefit of society. Two communication modes …
collaborate to provide various service for the benefit of society. Two communication modes …
Fully distributed ECC-based key management for mobile ad hoc networks
Dynamic nature of mobile ad hoc networks combined with their lack of centralized
infrastructure make security problem the most challenging issue in such networks. The main …
infrastructure make security problem the most challenging issue in such networks. The main …
An efficient identity-based key management scheme for wireless sensor networks using the bloom filter
Z Qin, X Zhang, K Feng, Q Zhang, J Huang - Sensors, 2014 - mdpi.com
With the rapid development and widespread adoption of wireless sensor networks (WSNs),
security has become an increasingly prominent problem. How to establish a session key in …
security has become an increasingly prominent problem. How to establish a session key in …
Comparative analysis of different polynomial interpolations for implementing key management techniques in MANETs
The backbreaking issue in mobile ad hoc networks (MANETs) is ensuring security which
abounds due to dynamic nature and unavailability of centralised infrastructure. Due to the …
abounds due to dynamic nature and unavailability of centralised infrastructure. Due to the …
An efficient multi-group key management protocol for heterogeneous IoT devices
MA Kandi, H Lakhlef, A Bouabdallah… - 2019 IEEE Wireless …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is a network made up of a large number of devices which are
able to automatically communicate to computer systems, people and each other providing …
able to automatically communicate to computer systems, people and each other providing …
ECL-EKM: An enhanced certificateless effective key management protocol for dynamic WSN
D Mall, K Konaté, ASK Pathan - 2017 International conference …, 2017 - ieeexplore.ieee.org
To solve the key management related problems encountered in symmetric as well as
asymmetric key based schemes, recently a public key based scheme known as …
asymmetric key based schemes, recently a public key based scheme known as …