2020
DOI: 10.1007/s11277-020-07155-y
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Method for Key Establishment Based on Symmetric Cryptography in Hierarchical Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 33 publications
0
5
0
Order By: Relevance
“…In this section, the proposed system is discussed with concerning its design parameters, algorithm, implementation, and performance. The existing systems suffers from the problem of availability as the gateway is a Single Point of Failure (SPOF) [31]. A SPOF is a fundamental problem in the design, functionality, or development of systems, or characteristic that poses a threat because it could result in a scenario in which a single malfunction or fault causes the entire system to crash.…”
Section: Proposed Authenticated Group Key Agreement For Iot Environmentmentioning
confidence: 99%
See 2 more Smart Citations
“…In this section, the proposed system is discussed with concerning its design parameters, algorithm, implementation, and performance. The existing systems suffers from the problem of availability as the gateway is a Single Point of Failure (SPOF) [31]. A SPOF is a fundamental problem in the design, functionality, or development of systems, or characteristic that poses a threat because it could result in a scenario in which a single malfunction or fault causes the entire system to crash.…”
Section: Proposed Authenticated Group Key Agreement For Iot Environmentmentioning
confidence: 99%
“…A SPOF is a fundamental problem in the design, functionality, or development of systems, or characteristic that poses a threat because it could result in a scenario in which a single malfunction or fault causes the entire system to crash. Depending on the interdependencies involved in the failure and the location of the failure [31]. To overcome the issue of SPOF we designed the proposed system using peer to peer approach.…”
Section: Proposed Authenticated Group Key Agreement For Iot Environmentmentioning
confidence: 99%
See 1 more Smart Citation
“…Mirvaziri et al [20] proposed a key establishment method based on symmetric cryptography as it consumes to have low energy as compared to the asymmetric one. While high memory consumes symmetric cryptosystems, this vulnerability can be minimized by suitable techniques.…”
Section: Related Workmentioning
confidence: 99%
“…Cryptography is a method of encrypting data and communication so that only the intended recipients can read and process it [4]. To protect communications between sensor devices, the WSN base station, and the admin, cryptographic methods use a set of encryption and decryption operations.…”
Section: Introductionmentioning
confidence: 99%