2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) 2016
DOI: 10.1109/iceeot.2016.7755389
|View full text |Cite
|
Sign up to set email alerts
|

A dynamic key distribution in wireless sensor networks with reduced communication overhead

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…Some mechanisms, for example, the master key pre-distribution 9 define a master key which is used (combined with some previously exchanged nonce values) by nodes to re-create the symmetric key. Some schemes 18 use different paradigms to distribute the keys, such as the use of mobile-agents capable of moving inside and distribute the cluster key dynamically and with reduced energy consumption. Alternative schemes use the key-matrix based dynamic key generation, 19 the identity-based encryption 20 and the threshold cryptography 21 to manage and distribute keys while reducing the energy consumption.…”
Section: Introductionmentioning
confidence: 99%
“…Some mechanisms, for example, the master key pre-distribution 9 define a master key which is used (combined with some previously exchanged nonce values) by nodes to re-create the symmetric key. Some schemes 18 use different paradigms to distribute the keys, such as the use of mobile-agents capable of moving inside and distribute the cluster key dynamically and with reduced energy consumption. Alternative schemes use the key-matrix based dynamic key generation, 19 the identity-based encryption 20 and the threshold cryptography 21 to manage and distribute keys while reducing the energy consumption.…”
Section: Introductionmentioning
confidence: 99%
“…When an off-duty node is replaced with a new node, the new node identity enters in the network, but node topology remains unchanged and the authentication mechanism does not need any updating. Other examples of network-based key predistribution schemes may be found in [1,2,8,14,15].…”
Section: Introductionmentioning
confidence: 99%
“…The sensing capabilities of IoT sensor nodes include providing measurements such as temperature, pressure, motion, etc. For this purpose, each sensor node in a WSN consists of a sensing, data processing, and memory unit [15]. Each sensor node is additionally equipped with a short-range radio communication unit [15].…”
Section: An Introduction To Wireless Sensor Networkmentioning
confidence: 99%
“…For this purpose, each sensor node in a WSN consists of a sensing, data processing, and memory unit [15]. Each sensor node is additionally equipped with a short-range radio communication unit [15]. Sensor nodes sense data from the ambient environment and send it to an edge node, often referred to as a sink node.…”
Section: An Introduction To Wireless Sensor Networkmentioning
confidence: 99%