2017 International Conference on Inventive Systems and Control (ICISC) 2017
DOI: 10.1109/icisc.2017.8068646
|View full text |Cite
|
Sign up to set email alerts
|

Chip-Based symmetric and asymmetric key generation in hierarchical wireless sensors networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…Although their scheme is scalable, secure, and lightweight, it shows high communication and computational overhead. On the other hand, Kumar et al [19] proposed a symmetric/asymmetric key predistribution scheme based on a hardware chip, called a Trusted Platform Module (TPM) that is added to the CHs and sensors in the hierarchal WSNs. This chip-based scheme resists physical attacks such as node capture attacks, node injection attacks, and node impersonation attacks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Although their scheme is scalable, secure, and lightweight, it shows high communication and computational overhead. On the other hand, Kumar et al [19] proposed a symmetric/asymmetric key predistribution scheme based on a hardware chip, called a Trusted Platform Module (TPM) that is added to the CHs and sensors in the hierarchal WSNs. This chip-based scheme resists physical attacks such as node capture attacks, node injection attacks, and node impersonation attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Instead of adopting a flat key management [13][14][15][16][17][18][19]26], our proposed scheme uses the hierarchical key management model [27,28]. In such models, sensors are distributed into different clusters.…”
Section: Model Of Proposed Schemementioning
confidence: 99%
“…If an attacker could clone the key of any member node, then such an attacker could mimic the member node to perform malicious activities within the network. Surprisingly, many efforts contributed by various researchers found in [11][12][13][14][15] have not been able to provide a balanced solution to the impending problem. In some cases, the solution to security problems becomes a tradeoff to other factors such as computational overhead, shortened network lifespan, and communication overhead.…”
Section: Introductionmentioning
confidence: 99%
“…A principal security feature often entails encrypting transport layer functions, hash functions, network payloads, and IP headers. In order to speed up processing, many laptops, mobile units, and IoT end-point-devices adopt the Trusted Platform Module (TPM) [48]- [50]. In the TPM, a hardware chip assists the communication equipment to store passwords, encryption keys, and digital certificates.…”
Section: Introductionmentioning
confidence: 99%