2018 2nd International Conference on I-Smac (IoT in Social, Mobile, Analytics and Cloud) (I-Smac)i-Smac (IoT in Social, Mobile, 2018
DOI: 10.1109/i-smac.2018.8653656
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Survey on Various key Management Schemes in WSN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…Key management refers to the management of cryptographic keys in a cryptosystem, as shown in Figure 3. The figure shows three types of cryptographic techniques, which are summarized below [7]: -A symmetric technique is a single shared secret key between the sender and the receiver. In this category, the key management is classified into pre-distributed technique and key agreement one.…”
Section: Key Managementmentioning
confidence: 99%
“…Key management refers to the management of cryptographic keys in a cryptosystem, as shown in Figure 3. The figure shows three types of cryptographic techniques, which are summarized below [7]: -A symmetric technique is a single shared secret key between the sender and the receiver. In this category, the key management is classified into pre-distributed technique and key agreement one.…”
Section: Key Managementmentioning
confidence: 99%
“…A central organization known as the Key Distribution Center (KDC) or group controller is in charge of creating and dispersing the group keys in a scheme known as centralized key management. Distributed key management systems eliminate the requirement for a central authority by distributing key management duties among group members [20]. Group Key Management (GKM) schemes.…”
Section: Introductionmentioning
confidence: 99%
“…In any cryptographic system, effective key management is essential for maintaining the confidentiality and integrity of transmitted data. Proper management of security keys significantly reduces the risk of unauthorised data access [ 5 , 6 ]. Moreover, in an IoT environment, where secure communication among IoT devices is paramount, key management plays a pivotal role in safeguarding data transmission and protecting against potential cyber-attacks [ 7 ].…”
Section: Introductionmentioning
confidence: 99%