2017
DOI: 10.3390/app7050490
|View full text |Cite
|
Sign up to set email alerts
|

A Key Management Scheme for Mobile Wireless Sensor Networks

Abstract: Symmetric encryption is the most commonly employed security solution in wireless sensor networks (WSNs). In this paper, a new approach that employs public-key cryptography during key establishment is proposed. In a WSN, the main issue for public-key cryptography is represented by communication and computational overheads. In order to reduce these requirements, a new authentication system based on authentication tables is proposed. An analytical study shows that the proposed approach provided optimal protection… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 24 publications
(9 citation statements)
references
References 29 publications
0
9
0
Order By: Relevance
“…Interactive models of communication at the nanoscale using nanoparticles that talk to one another D-5 Gandino, Celozzi, & Rebaudengo (2017) A Therefore, from the search, review, and evaluation process of the bibliographic material was collected a total 47 articles to build state of the art; identifying characteristics, applications, and capacities for their later analysis in which the possibilities and IoNT trends in various fields social welfare are exposed. IoNT has emerged mainly from the new technological trends that have arisen in recent years, resulting from the search for new research spaces and emerging technologies to produce hardware devices at scale.…”
Section: Id Authors Titlementioning
confidence: 99%
See 1 more Smart Citation
“…Interactive models of communication at the nanoscale using nanoparticles that talk to one another D-5 Gandino, Celozzi, & Rebaudengo (2017) A Therefore, from the search, review, and evaluation process of the bibliographic material was collected a total 47 articles to build state of the art; identifying characteristics, applications, and capacities for their later analysis in which the possibilities and IoNT trends in various fields social welfare are exposed. IoNT has emerged mainly from the new technological trends that have arisen in recent years, resulting from the search for new research spaces and emerging technologies to produce hardware devices at scale.…”
Section: Id Authors Titlementioning
confidence: 99%
“…g. Key management: The establishment of symmetric keys is called key management (Gandino, Celozzi, & Rebaudengo, 2017). In Wireless Sensor Networks (WSN), symmetric key cryptography is considered, mainly due to the low power in the batteries of these nodes (Kalkan & Levi, 2012).…”
Section: Security Mechanisms For Iont Systemsmentioning
confidence: 99%
“…A key hypergraph [9][10][11] Figure 1. Key management issues are also considered to have a major impact on the security scale of WSNs [12]. Recently, several group-authenticated key agreement approaches have been presented for WSNs.…”
Section: Introductionmentioning
confidence: 99%
“…Each sensor node can be equipped with visual and audio information collection modules such as microphones and video cameras. This has encouraged the development of wireless multimedia sensor networks (WMSNs) [2]. WMSNs consist of a large number of embedded devices that are equipped with low power cameras.…”
Section: Introductionmentioning
confidence: 99%