2020
DOI: 10.1049/iet-com.2019.1345
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight group key distribution schemes based on pre‐shared pairwise keys

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(10 citation statements)
references
References 25 publications
0
10
0
Order By: Relevance
“…In case of there has no pairwise key between two neighboring sensors in the original random key scheme, an MCS can help to establish a pairwise key of two neighboring sensors to improve the probability of connectivity. Motivated by a recently published group key distribution scheme by Harn et al in 2020 [20], we propose two key distribution schemes, one with confidentiality only and the other with both confidentiality and authenticity. Since the computations involved are logical Exclusive-OR (XOR) operations, they are both lightweight schemes.…”
Section: Figurementioning
confidence: 99%
“…In case of there has no pairwise key between two neighboring sensors in the original random key scheme, an MCS can help to establish a pairwise key of two neighboring sensors to improve the probability of connectivity. Motivated by a recently published group key distribution scheme by Harn et al in 2020 [20], we propose two key distribution schemes, one with confidentiality only and the other with both confidentiality and authenticity. Since the computations involved are logical Exclusive-OR (XOR) operations, they are both lightweight schemes.…”
Section: Figurementioning
confidence: 99%
“…Two papers recently published by Harn et al [6,7] propose some very simple key distribution schemes designed to enable two or more parties to establish a shared secret key with the aid of a third party. Unfortunately, as we show, most of the schemes are inherently insecure and all are incompletely specified.…”
Section: Introductionmentioning
confidence: 99%
“…Section 2 provides an introduction to the protocols in question, and sets them in the context of the extensive prior art. This is followed by analyses of the various proposed protocols: Sections 3, 4, 5 and 6 provide analyses of the four protocols in the first paper [7], and Section 7 briefly examines the almost identical protocols in the second paper [6]. Finally, Section 8 concludes the paper.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations