2017
DOI: 10.5120/cae2017652600
|View full text |Cite
|
Sign up to set email alerts
|

A Key Management Techniques in Wireless Sensor Networks

Abstract: Wireless sensor networks are visualized in military, medicinal services applications and business, where the data at these filed is very important. Security of the information in the system relies on the cryptographic strategy and the techniques in which encryption and decryption keys are built up among the nodes. Dealing with the keys in the system incorporates node validation, key understanding and key refresh stages which represents an extra overhead on system assets. Both Symmetric and Asymmetric key metho… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 50 publications
0
2
0
Order By: Relevance
“…SPNs have also been used in combination with other cryptographic techniques, such as key management and authentication, to provide a more comprehensive approach to image security [10]. For example, some image encryption algorithms based on SPNs use secret key management techniques to ensure that the encryption key is securely distributed and protected from unauthorized access [11].…”
Section: Introductionmentioning
confidence: 99%
“…SPNs have also been used in combination with other cryptographic techniques, such as key management and authentication, to provide a more comprehensive approach to image security [10]. For example, some image encryption algorithms based on SPNs use secret key management techniques to ensure that the encryption key is securely distributed and protected from unauthorized access [11].…”
Section: Introductionmentioning
confidence: 99%
“…SPNs have also been used in combination with other cryptographic techniques, such as key management and authentication, to provide a more comprehensive approach to image security [12]. For example, some image encryption algorithms based on SPNs use secret key management techniques to ensure that the encryption key is securely distributed and protected from unauthorized access [13].…”
Section: Introductionmentioning
confidence: 99%