The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2019
DOI: 10.3390/s19081909
|View full text |Cite
|
Sign up to set email alerts
|

Simple and Effective Secure Group Communications in Dynamic Wireless Sensor Networks

Abstract: Wireless Sensor Network (WSN) is a growing area of research in terms of applications, life enhancement and security. Research interests vary from enhancing network performance and decreasing overhead computation to solving security flaws. Secure Group Communication (SGC) is gaining traction in the world of network security. Proposed solutions in this area focus on generating, sharing and distributing a group key among all group members in a timely manner to secure their communication and reduce the computation… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 55 publications
(53 reference statements)
0
5
0
Order By: Relevance
“…The substantial difference in key sizes means that devices with lower computational capabilities will perform more effectively [33]. Significantly, ECC is based on the discrete logarithm structure of elliptic curves over finite fields.…”
Section: B Elliptic Curve Cryptography (Ecc)mentioning
confidence: 99%
“…The substantial difference in key sizes means that devices with lower computational capabilities will perform more effectively [33]. Significantly, ECC is based on the discrete logarithm structure of elliptic curves over finite fields.…”
Section: B Elliptic Curve Cryptography (Ecc)mentioning
confidence: 99%
“…It is known that ' ( ) is either L0 or L0 +1, where F = ' ( ). The authors of [11] made useful inequality (6) in order to analyze the storage overhead for key trees:…”
Section: A Storage Overheadmentioning
confidence: 99%
“…Therefore, enforcing access control is reduced to solving the GKM problem. Moreover, in order to guarantee backward and forward secrecy, the shared keys need to be changed whenever a new member joins or an existing one leaves its group [6]. To efficiently reduce the overhead keys management, resulting mainly from rekeying, GKM is extensively studied in the literature [12].…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, the MCS uses low capability devices (i.e., smartphones) to collect and transmit these data; thus, the cryptography system needs to address these limitations. Lightweight encryption schemes such as elliptic curve cryptography (ECC) are becoming increasingly desirable due to the growing interest surrounding the use of low computing power devices, particularly those associated with the Internet of Things (IoT) and wireless sensor networks (WSNs) [5][6][7][8][9][10][11][12]. Encryption schemes of this kind satisfy the need to maintain the confidentiality and integrity of transmitted data without compromising performance.…”
Section: Introductionmentioning
confidence: 99%