2019
DOI: 10.1109/access.2019.2935797
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Trust-Based Key Distribution With Self-Healing for Internet of Things

Abstract: Internet of things (IoT) can enable cyber-physical objects to communicate with one another and realize real-time living-needs control such as for vehicles, smart phones, refrigerators, healthcare gadgets and air-conditioners. Of the applications of IoT, collecting and receiving health-related data securely is the most crucial and significant use in the fields of community and hospital healthcare, where any single communication failure or data loss might cause a life damage risk. To address this problem, self-h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 52 publications
0
11
0
Order By: Relevance
“…Furthermore, when the group size increases, so does the computation complexity. For instance, Han et al [30] form a polynomial by multiplying all secret values of SNs. This scheme produces a polynomial with degree where is the number of SNs in a group.…”
Section: A Token Generationmentioning
confidence: 99%
“…Furthermore, when the group size increases, so does the computation complexity. For instance, Han et al [30] form a polynomial by multiplying all secret values of SNs. This scheme produces a polynomial with degree where is the number of SNs in a group.…”
Section: A Token Generationmentioning
confidence: 99%
“…Han et al [9] proposed a self-healing secure recovery and communication system. The authors proposed two different layers where thectop layer deploys the access control and deterministic link through polynomial schemes.…”
Section: Related Workmentioning
confidence: 99%
“…Afterward, the suppliers will supply the vaccines to various locations including hospitals, business organizations, and others. Secure and efficient vaccine distribution Han et al [9] Self-healing secure recovery and communication system…”
Section: Proposed Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…Almogren et al [28] have used fuzzy logic for resisting Sybil attack and thereby developed a trust management scheme. The existing system has also witnessed other trust-related schemes by Truong et al [29], Awan et al [30], Fang et al [31], Awan et al [32], Wang et al [33], Han et al [34], etc.…”
Section:  Blockchain-basedmentioning
confidence: 99%