2021
DOI: 10.1080/09540091.2021.1990212
|View full text |Cite
|
Sign up to set email alerts
|

Integrate the hierarchical cluster elliptic curve key agreement with multiple secure data transfer modes into wireless sensor networks

Abstract: Since sensor nodes in wireless sensor networks or Internet of things have limited resources, achieving secure data transmissions among nodes is a challenge. Hence, efficient key management schemes with lightweight ciphers are essential. Many asymmetric keys or public key mechanisms have been developed. However, they are unsuitable for secure group communications in wireless sensor networks, because sensor nodes are usually devoid of sufficient memory, CPU and bandwidth to deal with complex operations. In addit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 29 publications
0
5
0
Order By: Relevance
“…In addition, the authors did not discuss key-bargaining attacks. Lin [25] introduced a key synchronization protocol to support hierarchy in WSN-IoT by proposing a hierarchy-based cluster elliptic curve key agreement named (HCECKA). They claimed that their protocol provides efficiency and speed in key agreement and data transfer.…”
Section: Keys Exchange Studies Of Related Workmentioning
confidence: 99%
“…In addition, the authors did not discuss key-bargaining attacks. Lin [25] introduced a key synchronization protocol to support hierarchy in WSN-IoT by proposing a hierarchy-based cluster elliptic curve key agreement named (HCECKA). They claimed that their protocol provides efficiency and speed in key agreement and data transfer.…”
Section: Keys Exchange Studies Of Related Workmentioning
confidence: 99%
“…Feng et al [30] developed a trustbased altered approach for the authentication process to improve direct and indirect trust coupling. The various comparison of underwater communication systems' security schemes and protection models is shown in Table 1 [13,29].…”
Section: Underwater Networkmentioning
confidence: 99%
“…In the underwater network, this secure technique defends against possible threats. These approaches [6], [9-10][12][14] [15][16][17][18] address some security concerns and counteract some assaults, but our improved scheme validates every security requirement.…”
Section: Analysis and Open Research Concernsmentioning
confidence: 99%
“…MANETs are highly susceptible to several safety threats such as open medium, absence of central organization, energetically altering topology, inhibited competence and so forth. Hence group key management is used for secure communication 3‐5 . But, group key management in MANETs is difficult because of the requirement of scalability, safety under the limitations of nodes' obtainable properties and random agility.…”
Section: Introductionmentioning
confidence: 99%
“…Hence group key management is used for secure communication. [3][4][5] But, group key management in MANETs is difficult because of the requirement of scalability, safety under the limitations of nodes' obtainable properties and random agility. The group key management is two types such as key agreement and key distribution.…”
Section: Introductionmentioning
confidence: 99%