2015
DOI: 10.1109/access.2015.2445817
|View full text |Cite
|
Sign up to set email alerts
|

A PKI Adapted Model for Secure Information Dissemination in Industrial Control and Automation 6LoWPANs

Abstract: Wireless sensor nodes have a wide span of applications ranging from industrial monitoring to military operations. These nodes are highly constrained in terms of battery life, processing capabilities, and in-built memory. Industrial wireless sensor networks (IWSNs) have to meet the constraints and peculiarities of industrial environments to ensure synchronization with parallel production processes. Applications of WSNs in industrial communication vary from condition monitoring and sensing to process automation.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
14
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 15 publications
(16 citation statements)
references
References 27 publications
0
14
0
Order By: Relevance
“…Input: size of network-n Input: number of colluding nodes-p Output: Available key ring collection-A 1 Calculate the original key ring collection S of n by EBS framework; 2 Random select a key combination key i from S and insert key i to A; 3 if A satisfies the Theorem 1 then 4 Delete key i from S; 5 Calculate the union of keys in A, denoted as ; 6 Delete the subset of from S 7 end 8 else 9 Delete key i from A; 10 Delete key i from S 11 end 12 if S is empty then 13 if the size of A is no less than n then 14 return A When the proposed algorithm is carried out, a target key ring collection A that satisfies Theorem 1 is established. After assigning and distributing these key rings to nodes, a t-EEBS key management scheme can be implemented.…”
Section: Algorithm 1: Randomized Framework Constructionmentioning
confidence: 99%
See 3 more Smart Citations
“…Input: size of network-n Input: number of colluding nodes-p Output: Available key ring collection-A 1 Calculate the original key ring collection S of n by EBS framework; 2 Random select a key combination key i from S and insert key i to A; 3 if A satisfies the Theorem 1 then 4 Delete key i from S; 5 Calculate the union of keys in A, denoted as ; 6 Delete the subset of from S 7 end 8 else 9 Delete key i from A; 10 Delete key i from S 11 end 12 if S is empty then 13 if the size of A is no less than n then 14 return A When the proposed algorithm is carried out, a target key ring collection A that satisfies Theorem 1 is established. After assigning and distributing these key rings to nodes, a t-EEBS key management scheme can be implemented.…”
Section: Algorithm 1: Randomized Framework Constructionmentioning
confidence: 99%
“…Taking nodes N 1 , N 3 and N 6 for example, they can be evicted by broadcasting the messages illustrated in Table IV. The aforementioned construction algorithm can be implemented without any additional restrictions to parameter k and m. However, this algorithm is inefficient, and the result generated by this algorithm is unpredictable. (6,3,5).…”
Section: Algorithm 1: Randomized Framework Constructionmentioning
confidence: 99%
See 2 more Smart Citations
“…Another possible application is to monitor the manufacturing process in industry [16,17], where diverse sensors, actuators and controllers are connected to achieve Moreover, 6LoWPAN can be applied in the home automation control system [18,19] to offer services such as monitoring home temperature and status of doors or windows, as well as controlling the air conditioner or switches. Telematics [20,21] can also be achieved by using 6LoWPAN nodes for monitoring cars' movements.…”
Section: Lowpan Applicationsmentioning
confidence: 99%