2022
DOI: 10.1016/j.micpro.2022.104489
|View full text |Cite
|
Sign up to set email alerts
|

A hierarchical key management method for wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(10 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…Key management which involves the secure generation, distribution, and storage of cryptographic keys. It ensures that only authorized entities have access to the keys required for encryption and decryption [147], [148]. Maintaining the confidentiality of messages, preventing unauthorized entities from decrypting and accessing sensitive information by controlling access to cryptographic keys.…”
Section: Message Confidentialitymentioning
confidence: 99%
“…Key management which involves the secure generation, distribution, and storage of cryptographic keys. It ensures that only authorized entities have access to the keys required for encryption and decryption [147], [148]. Maintaining the confidentiality of messages, preventing unauthorized entities from decrypting and accessing sensitive information by controlling access to cryptographic keys.…”
Section: Message Confidentialitymentioning
confidence: 99%
“…However, different approaches have been put forth in the literature over the years for failure restoration 4–7 . These proposed methods differ in network formulations and requirements.…”
Section: Introductionmentioning
confidence: 99%
“…However, different approaches have been put forth in the literature over the years for failure restoration. [4][5][6][7] These proposed methods differ in network formulations and requirements. Examples of these models are swarm intelligence based on ant colony system (ACS), 8,9 enhanced genetic algorithm (EGA), 10 ant colony optimization (ACO), 11 and generic algorithm (GA).…”
mentioning
confidence: 99%
“… Nafi et al (2022) proposed a new key management protocol aiming to secure communications before and after key establishment, used hash and one–one functions to achieve security during the key establishment process. Rezaeipour & Barati (2022) presented a key management protocol that delivers services such as message confidentiality, integrity, and authenticity to wireless sensor networks by handling keys generation, distribution, and maintenance. Kandi et al (2022) proposed a novel decentralized blockchain-based protocol for the IoT, balanceing the loads between nodes according to their capabilities.…”
Section: Introductionmentioning
confidence: 99%