2020
DOI: 10.3390/s20082242
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Key Management to Secure IoT Wireless Sensor Networks in Smart-Agro

Abstract: With the deepening of the research and development in the field of embedded devices, the paradigm of the Internet of things (IoT) is gaining momentum. Its technology's widespread applications increasing the number of connected devices constantly. IoT is built on sensor networks, which are enabling a new variety of solutions for applications in several fields (health, industry, defense, agrifood and agro sectors, etc.). Wireless communications are indispensable for taking full advantage of sensor networks but i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 19 publications
(24 reference statements)
0
3
0
Order By: Relevance
“…The group key support strategy is also incorporated for reducing the communication overhead in key distribution. Similarly, to deal with malfunctioning of the IoT enabled systems, Hussein et al [35] investigated a secure protocol to maintain the secrecy rate in IoT environments and to reduce the energy consumption at IoT nodes. However, both these ECC frameworks are vulnerable against quantum attacks as edge centric faster and efficient security enabler nodes have not been considered to support the security operations of resources constrained IoT nodes.…”
Section: Related Workmentioning
confidence: 99%
“…The group key support strategy is also incorporated for reducing the communication overhead in key distribution. Similarly, to deal with malfunctioning of the IoT enabled systems, Hussein et al [35] investigated a secure protocol to maintain the secrecy rate in IoT environments and to reduce the energy consumption at IoT nodes. However, both these ECC frameworks are vulnerable against quantum attacks as edge centric faster and efficient security enabler nodes have not been considered to support the security operations of resources constrained IoT nodes.…”
Section: Related Workmentioning
confidence: 99%
“…Nodes connected to the Internet of Things (IoT) may gather user data from their environs, distribute that data among themselves, and communicate with other embedded software systems in their networks 1 . They create a substantial amount of user data, and nodes may not always be able to rely on one another during crucial communications.…”
Section: Introductionmentioning
confidence: 99%
“…Authentication between IoT devices and users has already been dealt with in many studies and is therefore not included in this paper [10,20,21,33]. We assume that the user has registered an identifier and a secret code to the IoT device through a secure channel during the authentication process.…”
mentioning
confidence: 99%