2022
DOI: 10.1016/j.jisa.2022.103370
|View full text |Cite
|
Sign up to set email alerts
|

IFKMS: Inverse Function-based Key Management Scheme for IoT networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(19 citation statements)
references
References 13 publications
0
17
0
Order By: Relevance
“…While in our solution, the gateway node needs to send one and receive (n gm ) messages, and the constrained node needs to send one and receive one message. Furthermore, the number of the involved constrained nodes in the revocation process is the smallest in our solution and the same for the gateway nodes; This makes our solution outperforms [14,16] in the case of a drained node for the constrained and the gateway nodes.…”
Section: Solutionmentioning
confidence: 86%
See 4 more Smart Citations
“…While in our solution, the gateway node needs to send one and receive (n gm ) messages, and the constrained node needs to send one and receive one message. Furthermore, the number of the involved constrained nodes in the revocation process is the smallest in our solution and the same for the gateway nodes; This makes our solution outperforms [14,16] in the case of a drained node for the constrained and the gateway nodes.…”
Section: Solutionmentioning
confidence: 86%
“…Figure 5, Figure 6, and Figure 7 demonstrate the communication overhead required by all the limited-resource nodes in the network in the three cases of compromised, left, and drained nodes, respectively. Our solution [14,16] Fig. 5 Communication overhead required by all the constrained nodes in the network in the case of compromised nodes.…”
Section: Communication Overheadmentioning
confidence: 99%
See 3 more Smart Citations