2016
DOI: 10.1016/j.ipl.2015.12.006
|View full text |Cite
|
Sign up to set email alerts
|

2D Hash Chain robust Random Key Distribution scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 7 publications
0
9
0
Order By: Relevance
“…A large pool of keys is generated of size |P|. We extend the pool by applying 2 hash function h and h ′ which are commutative in nature . The root of the hash chain is the original keys of the pool.…”
Section: The Proposed Cost‐effective Attack Matrix‐based Key Managemementioning
confidence: 99%
See 4 more Smart Citations
“…A large pool of keys is generated of size |P|. We extend the pool by applying 2 hash function h and h ′ which are commutative in nature . The root of the hash chain is the original keys of the pool.…”
Section: The Proposed Cost‐effective Attack Matrix‐based Key Managemementioning
confidence: 99%
“…This material is further used for other types of attack in network. Resilience against node capture is the resistance of key management schemes under adversarial attacks in WSN . Consider 2 nodes X and Y are secured by a pair‐wise key hmaxtrue(ixiytrue)()k0.…”
Section: Analysis Of Proposed Scheme With Existing Approachesmentioning
confidence: 99%
See 3 more Smart Citations