2018
DOI: 10.1007/s12652-018-0772-9
|View full text |Cite
|
Sign up to set email alerts
|

A self-managing volatile key scheme for wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 27 publications
0
8
0
Order By: Relevance
“…• Using one of the proposed key management schemes, such as Self-VKS [40], the entities may securely share a given large number K. We note that B and K should verify the conditions gcd 1 (K, B) = 1 and K > B.…”
Section: The Proposed Iot Encryption Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…• Using one of the proposed key management schemes, such as Self-VKS [40], the entities may securely share a given large number K. We note that B and K should verify the conditions gcd 1 (K, B) = 1 and K > B.…”
Section: The Proposed Iot Encryption Architecturementioning
confidence: 99%
“…However, the nature of such connected devices limits the use of conventional key establishment techniques. Many researchers have proposed to use symmetric key pre-distribution schemes for the key establishment objective [40,42]. These schemes consider the resource limitation, the communication capability and the computation speed [43].…”
Section: Key Establishment Algorithmmentioning
confidence: 99%
“…The research Laouid et al 69 of this work lies in two main facts: first, place the master key in a subset of sensors; second, the master keys are unstable. Our extensive simulations have shown the effectiveness of this approach.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Among the recently proposed works on the KMS for WSNs, a self-managing key scheme, which inserts the volatile master keys, i.e., master keys having very short life time, into a subset of all sensor nodes only in order to reduce their chances of obtaining by any attacker, has been proposed in [21]. The proposed scheme uses symmetric cryptography for generating the keys needed for establishing secure communication between the adjacent nodes.…”
Section: Related Workmentioning
confidence: 99%