2023
DOI: 10.1007/s11277-023-10410-7
|View full text |Cite
|
Sign up to set email alerts
|

Secure Key Management and Mutual Authentication Protocol for Wireless Sensor Network by Linking Edge Devices using Hybrid Approach

Abstract: Wireless Sensor Networks (WSNs) play a crucial role in developing the Internet of Things (IoT) by collecting data from hostile environments like military and civil domains with limited resources. IoT devices need edge devices to perform real-time processing without compromising the security with the help of key management and authentication schemes. The above applications are prone to eavesdropper due to cryptographic algorithms' weaknesses for providing security in WSNs. The security protocols for WSNs are di… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 47 publications
0
0
0
Order By: Relevance
“…Sharmila et.al. [15] in their article proposed a hybrid secure key management scheme using ECC and a hash function that generates key pre-distribution keys in wireless sensor networks. So as to achieve mutual authentication among the sensor nodes this hybrid approach is useful and it possesses less computational complexity.…”
Section: Literature Surveymentioning
confidence: 99%
“…Sharmila et.al. [15] in their article proposed a hybrid secure key management scheme using ECC and a hash function that generates key pre-distribution keys in wireless sensor networks. So as to achieve mutual authentication among the sensor nodes this hybrid approach is useful and it possesses less computational complexity.…”
Section: Literature Surveymentioning
confidence: 99%
“…Since there are fewer sensor nodes available in WSNs than in conventional networks, privacy methods change [28]. Larger key sizes are necessary for current encryption systems to offer high-security levels, increasing the computing and interpersonal expenses associated with key formation.…”
Section: Introductionmentioning
confidence: 99%
“…Larger key sizes are necessary for current encryption systems to offer high-security levels, increasing the computing and interpersonal expenses associated with key formation. In [28], a hybrid key administration method was proposed for WSNs connecting devices at the edge that create pre-distribution keys…”
Section: Introductionmentioning
confidence: 99%
“…The study mainly focuses on the utilization of spectral classification to improve the clustering process and enhance network security. A comprehensive evaluation of the proposed approach EEAS, SFTNP, AWFS and SEETA-IoT (22)(23)(24)(25) was proposed, considering energy consumption as a key metric. The results demonstrate the effectiveness of the algorithm in achieving secure and energy-efficient WSNs, highlighting its potential for real-world applications with minimal drawbacks.…”
Section: Introductionmentioning
confidence: 99%