2020
DOI: 10.1109/jiot.2020.2974839
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Dynamic Group Rekeying for Low-Power Wireless Networks in IIoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 62 publications
0
9
0
Order By: Relevance
“…When CM j receives this message, it decodes this message using k initial , confirms the ID of CH i and extracts k cluster (see line 4 of Algorithm 2). This process is performed according to Equation (4).…”
Section: Secure Intra-cluster Communicationmentioning
confidence: 99%
See 2 more Smart Citations
“…When CM j receives this message, it decodes this message using k initial , confirms the ID of CH i and extracts k cluster (see line 4 of Algorithm 2). This process is performed according to Equation (4).…”
Section: Secure Intra-cluster Communicationmentioning
confidence: 99%
“…They are equipped with a small battery (3,4). Recharging this battery is very difficult because sensors are usually scattered in insecure and inaccessible environments (5,6).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Practically, the methods addressing IoT-network security or access-level security are different than the one used for data-security. Approaches pertaining to the data security predominantly consider attackresilience, irrespective of the cost of computation (over large data size) and allied hardware realization [9]. On the contrary, the security measures designed towards access-control focus on retaining large key-size and encryption rounds to enable attackresilience [10][11][12].…”
Section: Introductionmentioning
confidence: 99%
“…In such circumstance, developing a robust lightweight encryption system with conditional confusion (say, limit constrained confusion in SPN) with lower key-size and minimum encryption rounds can be of great significance [29] [30]. Undeniably, SPN based lightweight encryption methods have gained wide-spread attention towards IoT security; however, have always been criticized for limited S-box generation [29] [34]. Moreover, their suitability with single key assisted encryption [30] has also been under suspicious lens.…”
Section: Introductionmentioning
confidence: 99%