2012
DOI: 10.1155/2012/813594
|View full text |Cite
|
Sign up to set email alerts
|

A Group Key Distribution Scheme for Wireless Sensor Networks in the Internet of Things Scenario

Abstract: As an indispensable part of the Internet of Things (IoT), wireless sensor networks (WSNs) need to be completely integrated into the Internet. When an Internet user communicates with multiple sensor nodes in WSNs, secure group key management becomes necessary. However, most current group key management schemes developed for WSNs do not consider the Internet scenario while traditional group key management in the Internet is deemed to be not suitable for WSNs due to the resource constraint characteristics of WSNs… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(25 citation statements)
references
References 22 publications
0
25
0
Order By: Relevance
“…It prevents from man-in-the-middle, Dose, Node capture attack and replay attack [2].Implements authentication system which provides mutual authentication between the users, sensors and gateways with fulfillment of security characteristics of IoT [3].Implements verifiable secret sharing cryptography through signature in6LowPAN environment [8]. Implements object authentication framework to exploit device specification information with normal change in fingerprints for preventing from the different security attack [4].Implements modification in MQTT frame-work's services for reducing the authorization delay, message overhead, etc. But, security is no concerning [1].…”
Section: IVmentioning
confidence: 99%
“…It prevents from man-in-the-middle, Dose, Node capture attack and replay attack [2].Implements authentication system which provides mutual authentication between the users, sensors and gateways with fulfillment of security characteristics of IoT [3].Implements verifiable secret sharing cryptography through signature in6LowPAN environment [8]. Implements object authentication framework to exploit device specification information with normal change in fingerprints for preventing from the different security attack [4].Implements modification in MQTT frame-work's services for reducing the authorization delay, message overhead, etc. But, security is no concerning [1].…”
Section: IVmentioning
confidence: 99%
“…En-route filtering, which is proposed in [2,24,25], is a well-known detection method against internal attack. This method can detect the internal attackers based on packet origin and abnormal patterns by replacing malicious nodes with legitimate nodes [26].…”
Section: Related Workmentioning
confidence: 99%
“…How to take measures to simultaneously solve both internal and external attacks is a problem worthy of study. The literature [9] combines cryptography and proposes a secret sharing technology with intrusion tolerance capabilities clustering routing scheme to improve the data transmission network intrusion tolerance capabilities. In order to reduce energy consumption and improve the route network security, the literature [11] introduced a secure boot program and node two-way mechanism evaluation to detect malicious node is directly removed from the network to enhance the security of the entire network.…”
Section: Description Of the Problemmentioning
confidence: 99%