Group key management in internet of things: A systematic literature review
IoT networks are gaining popularity in terms of group networks built by sensor nodes and
other IoT-related devices. The significance of cryptography protocols for secure …
other IoT-related devices. The significance of cryptography protocols for secure …
Security Challenges in Wireless Sensor Network: Current Status and Future Trends
GM Ram, E Ilavarasan - Wireless Personal Communications, 2024 - Springer
WSNs have several applications in the military, the environment, and medicine. These
applications often involve tracking sensor data, such as the actions of enemies on the …
applications often involve tracking sensor data, such as the actions of enemies on the …
GASE: A lightweight group authentication scheme with key agreement for edge computing applications
Motivated by the fact that mass authentication is one of the desirable security features in the
edge computing paradigm, we propose a lightweight group authentication protocol with a …
edge computing paradigm, we propose a lightweight group authentication protocol with a …
CoMAD: Context-aware mutual authentication protocol for drone networks
Drone technology is develo** very rapidly. Flying devices accomplishing various
applications are becoming an integral part of our daily life undoubtedly. Drones are …
applications are becoming an integral part of our daily life undoubtedly. Drones are …
Provably secure blockchain privacy-preserving smart contract centric dynamic group key agreement for large WSN
Abstract The contemporary Group Key Agreement (GKA) entails lightweight computing,
reduced communication, decentralized certification, personal privacy protection, traceability …
reduced communication, decentralized certification, personal privacy protection, traceability …
Fast and lightweight authenticated group key agreement realizing privacy protection for resource-constrained IoMT
Abstract Internet of Medical Things (IoMT) is mainly composed of patients, doctors and
medical data collection equipment. In IoMT, the health data of patients is collected in real …
medical data collection equipment. In IoMT, the health data of patients is collected in real …
Symmetric-bivariate-polynomial-based lightweight authenticated group key agreement for industrial internet of things
S Wu, C Hsu, Z **a, J Zhang, D Wu - Journal of Internet Technology, 2020 - jit.ndhu.edu.tw
Nowadays, mobile and embedded cyber-physical systems are ubiquitous and can be found
in many industrial applications, ranging from industrial control systems, modern vehicles, to …
in many industrial applications, ranging from industrial control systems, modern vehicles, to …
DBlock-RLB: An energy efficient framework for intelligent routing and trading based load balancing in SDWSN environment
NM Vaggu, RS Barpanda - Ad Hoc Networks, 2024 - Elsevier
Abstract Wireless Sensor Networks (WSNs) is an emerging field that enables them to work in
complex scenarios with enough flexibility. The WSN systems are improved in terms of …
complex scenarios with enough flexibility. The WSN systems are improved in terms of …
Cryptography and Key Management Schemes for Wireless Sensor Networks
J Sen - arxiv preprint arxiv:2307.00872, 2023 - arxiv.org
Wireless sensor networks (WSNs) are made up of a large number of tiny sensors, which can
sense, analyze, and communicate information about the outside world. These networks play …
sense, analyze, and communicate information about the outside world. These networks play …
[HTML][HTML] A survey of cryptography and key management schemes for wireless sensor networks
J Sen - Wireless Sensor Networks-Design, Applications and …, 2023 - intechopen.com
Wireless sensor networks (WSNs) are made up of a large number of tiny sensors, which can
sense, analyze, and communicate information about the outside world. These networks play …
sense, analyze, and communicate information about the outside world. These networks play …