2023
DOI: 10.1016/j.jisa.2022.103415
|View full text |Cite
|
Sign up to set email alerts
|

New key management scheme based on pool-hash for WSN and IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 13 publications
0
1
0
Order By: Relevance
“…More recently in Msolli et al, 36 a key management based on pool‐hash is presented. This scheme is based on the RKP scheme 32 .…”
Section: Related Workmentioning
confidence: 99%
“…More recently in Msolli et al, 36 a key management based on pool‐hash is presented. This scheme is based on the RKP scheme 32 .…”
Section: Related Workmentioning
confidence: 99%
“…To improve security, the authentication schema involves integrating encryption techniques, such as ''RSA-based public key cryptosystem'' [60], ''Secure Hash Agorithm (SHA)'' [61], ''Advanced Encryption Standard (AES)'' [62], and ''Elliptic Curve Cryptography (ECC)'' [63]. In recent years, ''access control, authentication and key management'' are widely-used two main security mechanisms in providing security in IoT-enabled environments [64], [65], [66], [67], [68], [69], [70], [71], [72], [73], [74], [75], [76], [77], [78], [79], [80].…”
Section: B Security Requirementsmentioning
confidence: 99%
“… Najafi & Babaie (2023) proposed approach, a lightweight hierarchical key management approach, generating shorter and more secure keys due to the use of a hierarchical structure based on the position and remaining energy of nodes. Msolli et al (2023) proposed the key management scheme with pool-hash for the establishment, which exposes a new key pool contains original keys and other hashed admit the same identities thus new session keys transmitted in sensors nodes are established during the discovery and path key phases. Taurshia et al (2022) presented a novel Group Key Management scheme for Low-Resource Devices (GKM-LRD) to offer key management service to groups in IoT applications.…”
Section: Introductionmentioning
confidence: 99%