Wireless sensor network key management survey and taxonomy
J Zhang, V Varadharajan - Journal of network and computer applications, 2010 - Elsevier
Wireless sensor networks (WSN) are mobile ad hoc networks in which sensors have limited
resources and communication capabilities. Secure communications in some wireless sensor …
resources and communication capabilities. Secure communications in some wireless sensor …
Dynamic key management algorithms in wireless sensor networks: A survey
MS Yousefpoor, H Barati - Computer Communications, 2019 - Elsevier
Wireless sensor networks include a large number of sensor nodes, which perform the
receiving, sending, and processing of the data. Because of the wireless nature of …
receiving, sending, and processing of the data. Because of the wireless nature of …
Authenticated group key transfer protocol based on secret sharing
Key transfer protocols rely on a mutually trusted key generation center (KGC) to select
session keys and transport session keys to all communication entities secretly. Most often …
session keys and transport session keys to all communication entities secretly. Most often …
Location-aware combinatorial key management scheme for clustered sensor networks
MF Younis, K Ghumman… - IEEE transactions on …, 2006 - ieeexplore.ieee.org
Recent advances in wireless sensor networks (WSNs) are fueling the interest in their
application in a wide variety of sensitive settings such as battlefield surveillance, border …
application in a wide variety of sensitive settings such as battlefield surveillance, border …
Dynamic key management in sensor networks
Numerous key management schemes have been proposed for sensor networks. The
objective of key management is to dynamically establish and maintain secure channels …
objective of key management is to dynamically establish and maintain secure channels …
Dynamic key management in wireless sensor networks: A survey
X He, M Niedermeier, H De Meer - Journal of network and computer …, 2013 - Elsevier
Wireless sensor networks (WSNs) have a vast field of applications, including environment
monitoring, battlefield surveillance and target tracking systems. As WSNs are usually …
monitoring, battlefield surveillance and target tracking systems. As WSNs are usually …
Secure group communication in wireless sensor networks: a survey
O Cheikhrouhou - Journal of Network and Computer Applications, 2016 - Elsevier
Abstract Wireless Sensor Networks (WSN) consist of a large number of sensor nodes which
are often deployed in an unattended harsh environment. As they are exposed to a wide …
are often deployed in an unattended harsh environment. As they are exposed to a wide …
Chinese remainder theorem based group key management
In this paper, we present two new centralized group key management protocols based on
the Chinese Remainder Theorem (CRT). By shifting more computing load onto the key …
the Chinese Remainder Theorem (CRT). By shifting more computing load onto the key …
A versatile Key Management protocol for secure Group and Device-to-Device Communication in the Internet of Things
MA Kandi, H Lakhlef, A Bouabdallah… - Journal of Network and …, 2020 - Elsevier
Abstract The Internet of Things (IoT) is a network made up of a large number of devices that
collaborate to provide various service for the benefit of society. Two communication modes …
collaborate to provide various service for the benefit of society. Two communication modes …
BARI+: a biometric based distributed key management approach for wireless body area networks
Wireless body area networks (WBAN) consist of resource constrained sensing devices just
like other wireless sensor networks (WSN). However, they differ from WSN in topology, scale …
like other wireless sensor networks (WSN). However, they differ from WSN in topology, scale …