Abstract:In wireless sensor networks (WSNs), data transmission is secured by authenticating secret keys. Secure key management is most important for network reliability and consistency. In this paper, a hierarchical group key management technique using threshold cryptography in Wireless Sensor Networks is proposed. The technique considers hierarchical sensor network, where sensing nodes are coordinated by forwarding nodes (FN) and in turn they are connected to the BS which is responsible for key computation and distrib… Show more
“…Singh Sukhjit et al [12] transmission range. Karan Kansara et al [13]has implemented Sensor based Automated Irrigation System with IOT that reviews the proposed to supports aggressive water management for the agricultural land. Microcontroller in the system promises about increase in systems life by reducing the power consumption resulting in lower power consumption.…”
The Internet of Things (IoT) is transforming agriculture by enabling farmers to address challenges related to livestock monitoring, conservation, and plant and soil management. With IoT-enabled devices and sensors, farmers can track crop growth, detect pests, and regulate smart irrigation and harvesters, leading to improvements in production quality, quantity, sustainability, and cost-effectiveness for both large and small farms. These sensors can detect soil and crop moisture levels, as well as pests, while a microcontroller makes decisions regarding automated irrigation based on data collected on soil electrical conductivity, temperature, and water content. In case of deviations from the field, the user is notified. Overall, the use of IoT technology in agriculture has significant potential to improve farming practices and meet the demand for food production in a changing world.
“…Singh Sukhjit et al [12] transmission range. Karan Kansara et al [13]has implemented Sensor based Automated Irrigation System with IOT that reviews the proposed to supports aggressive water management for the agricultural land. Microcontroller in the system promises about increase in systems life by reducing the power consumption resulting in lower power consumption.…”
The Internet of Things (IoT) is transforming agriculture by enabling farmers to address challenges related to livestock monitoring, conservation, and plant and soil management. With IoT-enabled devices and sensors, farmers can track crop growth, detect pests, and regulate smart irrigation and harvesters, leading to improvements in production quality, quantity, sustainability, and cost-effectiveness for both large and small farms. These sensors can detect soil and crop moisture levels, as well as pests, while a microcontroller makes decisions regarding automated irrigation based on data collected on soil electrical conductivity, temperature, and water content. In case of deviations from the field, the user is notified. Overall, the use of IoT technology in agriculture has significant potential to improve farming practices and meet the demand for food production in a changing world.
“…Each node sends a message and receives d messages from its neighbours, that is, d + 1 message by each node. Our solution has a low-complexity communication over other proposed solutions [11,[4][5][6][7][8], moreover, it is deterministic; key connectivity is equal to one (no concept of probability).…”
Section: 1comparison With Some Existing Solutionsmentioning
Securing a wireless communication has generally a vital importance, particularly when this communication is in a hostile environment like in wireless sensor networks (WSNs). The problem is how to create cryptographic keys between sensor nodes to ensure secure communications. Limited resources of sensor nodes make a public key cryptosystem such as RSA not feasible. So, most solutions rely on a symmetric cryptosystem. In this paper, we propose a new key management scheme based on symmetric cryptography which is well adapted to the specific properties of WSNs. The evaluation of our solution shows that it minimizes memory occupation, ensures scalability, and resists against the hardest attack: compromised nodes.
“…A unique public-key is used to verify the signatures of all sensor nodes within the monitored field. Singh et al [10] have proposed a hierarchical group-key management using threshold cryptography for wireless sensor networks. The proposed protocol is a key management technique using threshold cryptography.…”
In wireless sensor networks, security is one of the most challenging issues. An attack against sensors or the intruder intervention in the zone of interest can deny the integrity of the exchanged data between the sensors and the base station. In this paper, we propose a technique of data integrity protection using a novel method of shared cryptography for wireless sensor networks. Our proposal considers a cluster-based network. Sensor nodes belonging to a cluster are supervised by a cluster-head. The latter aggregates securely the sensed data and transmits them to the base station. Before sending the sensed data to the cluster-head, the sensor nodes encrypt partially the message using a shared cryptography protocol. The cluster-head reconstitutes the message in order to authenticate the integrity of the transmitted data. We have developed simulations, in which the obtained results show the performances of our protocol in terms of communication overhead and energy consumption.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.