2020
DOI: 10.3390/s20164388
|View full text |Cite
|
Sign up to set email alerts
|

A WSN Layer-Cluster Key Management Scheme Based on Quadratic Polynomial and Lagrange Interpolation Polynomial

Abstract: Since current key management schemes are mainly designed for static and planar networks, they are not very suitable for the layer-cluster wireless sensor networks (WSNs), a WSN layer-cluster key management scheme based on quadratic polynomial and Lagrange interpolation polynomial is proposed, in which the main idea of this scheme along the research line of broadcast identity authentication, session key, group key, network key and personal key. Specifically, authentication key can be established on the basis of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 40 publications
0
4
0
Order By: Relevance
“…As can be seen from Figure 2, the increase of the polynomial order is accompanied by the increase of the calculation amount, and at the same time, the increase of the number of nodes in the network is accompanied by the increase of the calculation amount of each cluster head. Therefore, if an excess number of cluster head nodes are captured, the security will be compromised [33,34]. As shown in Figure 3, since the computing performance is allocated to more cluster head nodes, the increase in the number of cluster head nodes can improve the performance of the network.…”
Section: Methodsmentioning
confidence: 99%
“…As can be seen from Figure 2, the increase of the polynomial order is accompanied by the increase of the calculation amount, and at the same time, the increase of the number of nodes in the network is accompanied by the increase of the calculation amount of each cluster head. Therefore, if an excess number of cluster head nodes are captured, the security will be compromised [33,34]. As shown in Figure 3, since the computing performance is allocated to more cluster head nodes, the increase in the number of cluster head nodes can improve the performance of the network.…”
Section: Methodsmentioning
confidence: 99%
“…The key distribution protocol only needs logical XOR operation, which is much faster than other schemes. Wang et al (2020) proposed a WSN layer-cluster key management scheme based on quadratic polynomial and Lagrange interpolation polynomial is proposed. Nafi, Bouzefrane & Omar (2020) proposed a new lightweight matrix-based key management protocol for IoT network.…”
Section: Introductionmentioning
confidence: 99%
“…Most innovators used Lagrange Interpolation for key management [8,9]. Due to its irreversible and confusing property, interpolation is quite popular in cryptography [10,11]. The Interpolation method integrated with the ECC algorithm led to the modification of that algorithm [12]; its incorporation led to a tradeoff between time and space.…”
Section: Introductionmentioning
confidence: 99%
“…) = ∑ (𝑁 𝑖 − 𝑁) ̅̅̅̅2 𝑗 𝑖=1(11) Where, M and N are two data points whose values are taken randomly through the generator. j is the number of data points taken.…”
mentioning
confidence: 99%