2019
DOI: 10.1007/s42452-019-1628-4
|View full text |Cite
|
Sign up to set email alerts
|

A cognitive key management technique for energy efficiency and scalability in securing the sensor nodes in the IoT environment: CKMT

Abstract: IoT Consist of interrelated devices such as digital devices, mechanical devices, computer system, sensors, etc. for transceiving the information over the network. The scalability is essential to enhance the energy utilization and the performance of the environment, while mobility enhances the coverage of the system. Key management is vital for encrypted information transmitted over the network. Although many key management techniques are available, still it is a challenging issue concerning energy and computat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 25 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…The last member of each of the clusters is designated as a cluster head and the last member of the group is designated as the group controller. In [27] the authors propose a cognitive key management technique (CKMT) in a cluster-based mobile environment. They claim that it reduces the rekeying process, which is required for a mobile node when it enters a new location area, thereby reducing the computational overhead and enhances the scalability to large size network.…”
Section: Block-chain and Clustering In Wsnmentioning
confidence: 99%
“…The last member of each of the clusters is designated as a cluster head and the last member of the group is designated as the group controller. In [27] the authors propose a cognitive key management technique (CKMT) in a cluster-based mobile environment. They claim that it reduces the rekeying process, which is required for a mobile node when it enters a new location area, thereby reducing the computational overhead and enhances the scalability to large size network.…”
Section: Block-chain and Clustering In Wsnmentioning
confidence: 99%
“…These required characteristics will increase the performance of IoT but the network suffers from security attacks in different layers of IoT. The primary idea of this work is to model the behavior of DDoS attack (Feroz Khan and Anandharaj, 2019; Aziz Rao and Ehsan-ul-Haq, 2018), a kind of denial-of-service attack (Kapetanovic et al , 2015), which sends malicious traffic to the channel for the purpose of denying access to it. IoT has suffered on a higher basis by the various versions of DDoS attacks at each layer.…”
Section: Proposed Countermeasuresmentioning
confidence: 99%
“…An IoT infrastructure usually integrates various sensors, memories, computing units, and gateway modules to complete the tasks of data acquisition, storage, and forwarding transmissions to a cloud platform. Compared with traditional networks, IoT device nodes are based on physical connections with smaller storage space, wider distribution, and diversified transmission protocols [7,8]. This makes common privacy protection methods difficult to be directly transplanted to IoT devices, and undoubtedly increases the risk of disclosure of privacy data, especially a large amount of physiological data, which can be used to evaluate human health status [9].…”
Section: Introductionmentioning
confidence: 99%