2021
DOI: 10.1007/s11235-021-00844-4
|View full text |Cite
|
Sign up to set email alerts
|

An efficient secure key establishment method in cluster-based sensor network

Abstract: The main issue for the security of wireless sensor networks (WSNs) is how to allow sensor nodes (SNs) to establish and share cryptographic keys in an energy-efficient, storage-efficient, and authentic manner for their secure data transmission. Furthermost recent studies carried out in this direction is concerned with homogeneous networks in which all sensor has identical characteristics and key administration mechanisms. Although Cluster-based sensor networks have demonstrated better achievements and performan… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…In 2018, Al-Qurabat et al 58 presented an Adaptive-Distributed Data-Collection (EADiDaC) to resolve the issues of a continuous gathering of huge amounts of redundant sensed measurements. EADiDaC works in cycles and each cycle has four stages: (1) for sampling rate adaptation. This model allows each SN to eliminate the redundant data transmission and also adapts the sampling rate depending on the environmental situations, thus it conserves energy and prolongs network lifetime.…”
Section: Data Transmission Reduction Techniques At the Sn Stagementioning
confidence: 99%
See 2 more Smart Citations
“…In 2018, Al-Qurabat et al 58 presented an Adaptive-Distributed Data-Collection (EADiDaC) to resolve the issues of a continuous gathering of huge amounts of redundant sensed measurements. EADiDaC works in cycles and each cycle has four stages: (1) for sampling rate adaptation. This model allows each SN to eliminate the redundant data transmission and also adapts the sampling rate depending on the environmental situations, thus it conserves energy and prolongs network lifetime.…”
Section: Data Transmission Reduction Techniques At the Sn Stagementioning
confidence: 99%
“…This work finds correlation features between the data attribute to build a bidirectional LSTM-based data prediction. MNMF considers three factors: (1) the temporal correlation between SN data and past data; (2) the spatial correlation of SN data with other SNs; and (3) the low data quality due to transmission error. MNMF reduces the energy consumption of SNs and extends the WSN lifespan with high prediction accuracy and acceptable bias.…”
Section: Data Transmission Reduction Techniques At the Sn Stagementioning
confidence: 99%
See 1 more Smart Citation
“…The implementation of the gateway-level trust has been discussed in Section 3.2. These nodes use the WMN's authentication and deauthentication algorithms that have been discussed in Section 3.3 to ensure that mesh routers can connect securely to the network [26,27].…”
Section: Ddos Attack Prevention Mechanism (Dapm)mentioning
confidence: 99%
“…In Figures 6(c Figures 6 and 7 depict the probability of mesh router message reachabilities for the proposed DAPM, where the existing schemes are configured with the number of group head values of 5 and 10. Once comparing N G values of 5 and 10, the proposed system gives better performance for authentication and deauthentication policies [25][26][27]. In order to authenticate mesh router in DSA-Mesh, the mesh router message must be received by a minimum of ðN G /2Þ + 1 group heads.…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%