2021
DOI: 10.1049/cmu2.12312
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight key establishment with the assistance of mutually connected sensors in wireless sensor networks (WSNs)

Abstract: Sensitive data collected by a wireless sensor network (WSN) should be protected by a secret key shared between two adjacent (or neighboring) sensors. Sensors are mobile devices with limited memory and computational power, and sensors are deployed in a field randomly in which relative positions among sensors cannot be pre-determined. Key distribution in WSN is a challenging research problem. Random key distribution is one of the most popular key distribution techniques in WSN; but it is a probabilistic key dist… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 20 publications
(25 reference statements)
0
4
0
Order By: Relevance
“…This figure takes fewer time data for data description with different sizes. It obtains better results than Liu (2) , https://www.indjst.org/ Pathack G. (6) and Vandervelden (7) . The proposed system reduces data encryption time due to small key generation.…”
Section: Resultsmentioning
confidence: 96%
See 1 more Smart Citation
“…This figure takes fewer time data for data description with different sizes. It obtains better results than Liu (2) , https://www.indjst.org/ Pathack G. (6) and Vandervelden (7) . The proposed system reduces data encryption time due to small key generation.…”
Section: Resultsmentioning
confidence: 96%
“…According to analysis, reactive protocols such as Dynamic Source as well as Dynamic MANET on Demand Routing function best than composite protocols such as Zone Routing Protocol when used in sensor systems with higher duty cycles. (1) Liu, W. et al (2) proposed technique describes a revolutionary lightweight key establishment architecture built on top of random key distribution. It can boost the likelihood of communication between two nearby sensors, and the second approach can also let sensors verify the pairwise key that has been formed.…”
Section: Introductionmentioning
confidence: 99%
“…Table 2 presents a detailed analysis and contrast between the PDCH and the proposed protocol, highlighting significant performance improvements. The results indicate that the proposed method is innovative, offering energy savings and enhanced packet transfer by mitigating packet drop, distinguishing itself from other key protocols like (9)(10)(11)(12)(13)(14)(15).…”
Section: Energy Consumption (Ec)mentioning
confidence: 97%
“…The protocol surpasses 'LEACH' across various network sizes and topologies, reducing the overhead associated with active cluster formation in LEACH. Additionally, PEGASIS minimizes the data broadcast workload by efficiently organizing a chain for data gathering, ensuring a more evenly distributed power capacity throughout the network (11) (12) .…”
Section: Pegasis Based Protocolsmentioning
confidence: 99%