2018
DOI: 10.4018/ijsssp.2018100101
|View full text |Cite
|
Sign up to set email alerts
|

A Robust and Lightweight Key Management Protocol for WSNs in Distributed IoT Applications

Abstract: To maintain the reliable connectivity and the accessibility of distributed IoT, it is vital to establish secure links for end-to-end communication with a robust pervasive communication mechanism. However, due to the resource constraints and heterogeneous characteristics of the sensor devices, traditional authentication and key management schemes are not effective for such applications. Here, we propose a pervasive lightweight authentication and keying mechanism for WSNs in distributed IoT applications in which… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 31 publications
0
2
0
Order By: Relevance
“…This study proposes an end-to-end verification method for the application layer. The application layer is safeguarded using IEEE802.15.4 security techniques from the physical and MAC levels [ 42 ]. After validating each other and creating secure communication links, the distributed nature of the architecture enables edge nodes, CHs, BSs, and end-users to verify each other.…”
Section: Various Communication Links In Iot Networkmentioning
confidence: 99%
“…This study proposes an end-to-end verification method for the application layer. The application layer is safeguarded using IEEE802.15.4 security techniques from the physical and MAC levels [ 42 ]. After validating each other and creating secure communication links, the distributed nature of the architecture enables edge nodes, CHs, BSs, and end-users to verify each other.…”
Section: Various Communication Links In Iot Networkmentioning
confidence: 99%
“…Key management involves a secret key generation, distribution, storage, updating, and destruction. Key distribution system divided into four categories such as a) key broadcast distribution [37], b) group key distribution [38], c) master key pre-distribution; [39] and d) pairwise key distribution [40,41]. Perception layer vulnerable to the following attacks.…”
Section: Perception Layer and Security Attacksmentioning
confidence: 99%