[HTML][HTML] Ahkm: an improved class of hash based key management mechanism with combined solution for single hop and multi hop nodes in iot
ABF Khan, G Anandharaj - Egyptian Informatics Journal, 2021 - Elsevier
The extensive growth of the Internet of Things (IoT) devices leads to the evolution of the
broad range of smart applications in numerous fields such as smart home, wearable …
broad range of smart applications in numerous fields such as smart home, wearable …
New key management scheme based on pool-hash for WSN and IoT
Abstract The Internet of Things (IoT) brings together the applications linking many devices to
the Internet to make the environment more “smart”. Uses vary from the human scale, from …
the Internet to make the environment more “smart”. Uses vary from the human scale, from …
Utilizing hash graphs for key distribution for mobile and replaceable interconnected sensors in the IoT context
A Levi, S Sarimurat - Ad Hoc Networks, 2017 - Elsevier
In most general terms, Internet of Thing (IoT) applications and networks contain
interconnected equipment, which are mostly resource constrained. Sensor nodes with …
interconnected equipment, which are mostly resource constrained. Sensor nodes with …
[PDF][PDF] Energy efficient cluster based key management technique for wireless sensor networks
T Lalitha, R Umarani - India. InternationalJournal of …, 2012 - computerscijournal.org
ABSTRACT Wireless Sensor Networks (WSN) is vulnerable to node capture attacks in which
an attacker can capture one or more sensor nodes and reveal all stored security information …
an attacker can capture one or more sensor nodes and reveal all stored security information …
Survey on key pre distribution for security in wireless sensor networks
TP Rani, C Jaya Kumar - Advances in Computer Science and Information …, 2012 - Springer
Wireless sensor networks (WSNs) consists of small nodes with constrained capabilities to
sense, collect, and disseminate information in many types of applications. As sensor …
sense, collect, and disseminate information in many types of applications. As sensor …
Cluster based key management schemes in wireless sensor networks: a survey
B Nithya - Procedia Computer Science, 2020 - Elsevier
Abstract Wireless Sensor Network (WSN) consists of huge number of sensor nodes which
has the capability of sensing physical phenomenon around them. This sensed data is …
has the capability of sensing physical phenomenon around them. This sensed data is …
[PDF][PDF] Suggesting a method to improve encryption key management in wireless sensor networks
M Toghian, MC Morogan - Indian Journal …, 2015 - sciresol.s3.us-east-2.amazonaws …
Abstract Background/Objectives: Recent technology achievements in electronics and
wireless communication makes it possible to provide sensor nodes in low cost, low power …
wireless communication makes it possible to provide sensor nodes in low cost, low power …
Scalable and storage efficient dynamic key management scheme for wireless sensor network
Recently, there have been exploratory growth in the research of wireless sensor network
due to wide applications like health monitoring, environment monitoring, and urban traffic …
due to wide applications like health monitoring, environment monitoring, and urban traffic …
SKWN: Smart and dynamic key management scheme for wireless sensor networks
S Mesmoudi, B Benadda… - International Journal of …, 2019 - Wiley Online Library
In the era of the Internet of Things (IoT), we are witnessing to an unprecedented data
production because of the massive deployment of wireless sensor networks (WSNs) …
production because of the massive deployment of wireless sensor networks (WSNs) …
An elliptic-curve-based hierarchical cluster key management in wireless sensor network
SK Sahoo, MN Sahoo - … , Networking, and Informatics: Proceedings of the …, 2014 - Springer
In wireless sensor networks (WSN), because of the absence of physical protection and
unattended deployment, the wireless connections are prone to different types of attacks …
unattended deployment, the wireless connections are prone to different types of attacks …