2019
DOI: 10.1007/s11276-019-01980-1
|View full text |Cite
|
Sign up to set email alerts
|

DSKMS: a dynamic smart key management system based on fuzzy logic in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
9

Relationship

5
4

Authors

Journals

citations
Cited by 45 publications
(29 citation statements)
references
References 35 publications
0
23
0
Order By: Relevance
“…is research work used cryptographic techniques, most especially the ECC (Elliptic Curve Cryptography) technique, because it has low computation complexity for cryptographic operations. Moreover, the energy consumption and communication costs of these schemes are very low [24][25][26][27][28][29][30]. e comprehensive review of the related research work proposed by authors is studied and analyzed in this section for efficient key management in WSN.…”
Section: Literature Surveymentioning
confidence: 99%
“…is research work used cryptographic techniques, most especially the ECC (Elliptic Curve Cryptography) technique, because it has low computation complexity for cryptographic operations. Moreover, the energy consumption and communication costs of these schemes are very low [24][25][26][27][28][29][30]. e comprehensive review of the related research work proposed by authors is studied and analyzed in this section for efficient key management in WSN.…”
Section: Literature Surveymentioning
confidence: 99%
“…Yousefpour et al 37 proposed a key management method called DSKMS. DKMS is a hierarchical key management method based on fuzzy logic.…”
Section: Related Workmentioning
confidence: 99%
“…Euclid's and fuzzy logic theorems are combined to perform key publications which ultimately show better evaluation results [14]. In terms of key delivery, fuzzy logic is also used to secure keys that are transmitted through wireless sensor network devices [21]. Fuzzy logic is also combined with the Diffie Helman technique to secure the key sent to the recipient [22].…”
Section: Indexmentioning
confidence: 99%