2013
DOI: 10.1002/cpe.3153
|View full text |Cite
|
Sign up to set email alerts
|

A lightweight key management scheme based on an Adelson‐Velskii and Landis tree and elliptic curve cryptography for wireless sensor networks

Abstract: Wireless sensor networks are increasingly used in most varied fields such as environment, health, and military. Often, information transmitted on these networks requires encryption to maintain confidentiality, integrity, and non-repudiation. But encryption techniques used to encrypt data on wired networks are not suitable for sensor networks that consist of small nodes equipped with limited resources. In this paper; we propose a security method for wireless sensor networks that provides good protection while t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 27 publications
0
1
0
Order By: Relevance
“…To receive collected data from low-end devices, these devices need to communicate in an insecure environment [25,26,27,28] (such as the Internet) or insecure infrastructure (public cloud) [29] to send data to a high-end unit for further computation and processing. A common network model to connect devices consists of three main ways [30,31,32,33]. The first is the communication between each node and remote unit, which is used for mutual authentication and to exchange collected data.…”
Section: Introductionmentioning
confidence: 99%
“…To receive collected data from low-end devices, these devices need to communicate in an insecure environment [25,26,27,28] (such as the Internet) or insecure infrastructure (public cloud) [29] to send data to a high-end unit for further computation and processing. A common network model to connect devices consists of three main ways [30,31,32,33]. The first is the communication between each node and remote unit, which is used for mutual authentication and to exchange collected data.…”
Section: Introductionmentioning
confidence: 99%