2015
DOI: 10.1155/2015/827546
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks

Abstract: In recent years, wireless sensor network (WSN) applications have tended to transmit data hop by hop, from sensor nodes through cluster nodes to the base station. As a result, users must collect data from the base station. This study considers two different applications: hop by hop transmission of data from cluster nodes to the base station and the direct access to cluster nodes data by mobile users via mobile devices. Due to the hardware limitations of WSNs, some low-cost operations such as symmetric cryptogra… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…Osman Yagan and Armand M. Makowski [10] presents schemes for providing secure keys for sensors to achieve more security during attack by hackers and less association with computation complexity of the large network.…”
Section: Kr Asha MC Supriyamentioning
confidence: 99%
“…Osman Yagan and Armand M. Makowski [10] presents schemes for providing secure keys for sensors to achieve more security during attack by hackers and less association with computation complexity of the large network.…”
Section: Kr Asha MC Supriyamentioning
confidence: 99%
“…18 In order to simplify the secret key management, Shamir proposed the concept of identity-based cryptography for the first time in 1984. 20 Combined with cryptography, a combination of the same key generation algorithm of two or more cryptographic primitives (such as encryption and signature) can use the same key for different cryptographic operations. 20 Combined with cryptography, a combination of the same key generation algorithm of two or more cryptographic primitives (such as encryption and signature) can use the same key for different cryptographic operations.…”
Section: Identity-based Combined Encryption and Signature Cryptosystemmentioning
confidence: 99%
“…19 In this system, a public key can be calculated directly using the identification of a user, and a private key can be generated by key generation center (KGC). 20 Combined with cryptography, a combination of the same key generation algorithm of two or more cryptographic primitives (such as encryption and signature) can use the same key for different cryptographic operations. Using a combination of cryptography will greatly reduce the amount of identity information and the cost of the private KGC to generate a key.…”
Section: Identity-based Combined Encryption and Signature Cryptosystemmentioning
confidence: 99%
See 1 more Smart Citation
“…Adoption of middleware system is also claimed to offer better security system in adhoc network as the authors Silva and Albini [27] claimed to enhance the key management operation in MANET. Dynamic key management approach towards resisting key-based attack was discussed by Chen et al [28]. Ghosh and Datta [29] have presented a model where the address information of the mobile nodes is secured against all the existing security challenges in MANET.…”
Section: Introductionmentioning
confidence: 99%