2015 IEEE International Advance Computing Conference (IACC) 2015
DOI: 10.1109/iadcc.2015.7154753
|View full text |Cite
|
Sign up to set email alerts
|

An hybrid secure scheme for secure transmission in grid based Wireless Sensor Network

Abstract: In a Wireless Sensor Networks (WSNs) the sensor nodes are placed in an environment depending on the applications where secure communication is in high demand. To ensure the privacy and safety of data transactions in the network, a unique identification for the nodes and secure key for transportation have become major concerns. In order to establish a secure communication channel in the network, care and address the recourse constraints related to the devices and the scalability of the network when designing a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…TAKS2 is the enhanced version: 11 both represent a hybrid cryptography scheme, since they do not rely explicitly on asymmetric or symmetric keys to secure the WSN data transmissions. In literature, there exist other hybrid cryptography schemes 25,28,29 but TAKS2 is the only scheme proving WSNs with a secure encryption mechanism along a topology-based authentication with minimal performance overhead and memory footprint.…”
Section: Taksmentioning
confidence: 99%
See 1 more Smart Citation
“…TAKS2 is the enhanced version: 11 both represent a hybrid cryptography scheme, since they do not rely explicitly on asymmetric or symmetric keys to secure the WSN data transmissions. In literature, there exist other hybrid cryptography schemes 25,28,29 but TAKS2 is the only scheme proving WSNs with a secure encryption mechanism along a topology-based authentication with minimal performance overhead and memory footprint.…”
Section: Taksmentioning
confidence: 99%
“…In comparison with other hybrid-cryptography schemes, 2225 TAKS is suitable for real-world WSN motes, has lower average overhead both in timing performance and memory occupation, and provides the possibility of choosing different approaches for symmetric encryption/decryption and for authentication of received messages. In Table 1, we present a brief comparison of common general cryptographic solutions and TAKS2, while in Table 2 a comparison with other state-of-the-art hybrid cryptographic schemes for WSN is shown.…”
Section: Introductionmentioning
confidence: 99%
“…Security features of ECTAKS may include confidentiality (data encryption), data integrity and sender authentication (signature). Other examples of hybrid KEPs may be found in [9,10,16]. In ECTAKS the shared secret is a symmetric key generated by each party involved in the communication session upon a successful authentication process, where each party verifies if the other party belongs to its authenticated network.…”
Section: Introductionmentioning
confidence: 99%
“…Generally, the framework involving ambient intelligence is based on vital key technologies such as versatile computing, versatile communication and sharp user interfaces [5] [11]. Geographically distributed sensor devices can be accessible using the A3 concept [12]. Integration of sensor networks with the grid can be established by means of middleware architecture.…”
Section: Recent Workmentioning
confidence: 99%