2016 IEEE International Conference on Recent Trends in Electronics, Information &Amp; Communication Technology (RTEICT) 2016
DOI: 10.1109/rteict.2016.7807871
|View full text |Cite
|
Sign up to set email alerts
|

Digital signature based key management protocol for secure data transfer in dynamic wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…Rank Points Quality Evaluation MES V-II [9] 2 1.5 Decent DSKM [10] 0 0 Low CBC-RC5 [11] 2 1.5 Decent HCCTPWLCM [12] 2 1.5 Decent ECCGASONeC [3] 3 2 Outstanding QTL [13] 2 1.5 Decent UES-IV [14] 2 1.5 Decent LiCi 2 1.5 Decent LCSA [15] 2 1.5 Decent ESDCBE [16] 2 1.5 Decent Multiplexing AES [17] 2 1.5 Decent AES-QPSK [18] 2 1.5 Decent ECC-DA [19] 2 1.5 Decent EEM [20] 2 1.5 Decent LPRGA [21] 2 1.5 Decent LED [22] 2 1.5 Decent SECM [23] 3 2 Outstanding DCA-SNC [24] 2 1.5 Decent ECC-KM [25] 1 1 Average ECB [26] 2 1.5 Decent MR_XOR [27] 2 1.5 Decent CP-ABE [28] 2 1.5 Decent ECC-AES [29] 2 1.5 Decent MutationAES [30] 2 1.5 Decent RSA approach [31] 2 1.5 Decent MRSA [27] 2 1.…”
Section: Research Articlesmentioning
confidence: 99%
“…Rank Points Quality Evaluation MES V-II [9] 2 1.5 Decent DSKM [10] 0 0 Low CBC-RC5 [11] 2 1.5 Decent HCCTPWLCM [12] 2 1.5 Decent ECCGASONeC [3] 3 2 Outstanding QTL [13] 2 1.5 Decent UES-IV [14] 2 1.5 Decent LiCi 2 1.5 Decent LCSA [15] 2 1.5 Decent ESDCBE [16] 2 1.5 Decent Multiplexing AES [17] 2 1.5 Decent AES-QPSK [18] 2 1.5 Decent ECC-DA [19] 2 1.5 Decent EEM [20] 2 1.5 Decent LPRGA [21] 2 1.5 Decent LED [22] 2 1.5 Decent SECM [23] 3 2 Outstanding DCA-SNC [24] 2 1.5 Decent ECC-KM [25] 1 1 Average ECB [26] 2 1.5 Decent MR_XOR [27] 2 1.5 Decent CP-ABE [28] 2 1.5 Decent ECC-AES [29] 2 1.5 Decent MutationAES [30] 2 1.5 Decent RSA approach [31] 2 1.5 Decent MRSA [27] 2 1.…”
Section: Research Articlesmentioning
confidence: 99%
“…60 This study presents digital signature based on key management (DK) for data security. 61 Asymmetric method doubles the computation time. [62][63][64] Research in Gracy and Venkatesan 65 uses honey encryption (HoneyE) procedure to create misperception.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Side-channel attack can occur 60 D K 61 -Vulnerable to related-key attacks 73 RC5-CBC 74 -Differential attack and linear attack occur because of the usage of RC5, 75 also used PRNG, which makes it vulnerable to direct cryptanalytic attack, input-based attack, backtracking attack and many more 38 HTPW 39 -Chosen-plaintext attack can occur on this because of XOR operation used. Also suffer from known-plaintext attack 13 EGASON 3 Passive attack, key-space analysis attack, compromised CH attack, Sinkhole attack, HELLO flood attack, and DOS attacks cannot occur Vulnerable to brute-force attack.…”
Section: Serial Nomentioning
confidence: 99%
“…Shruthi G J and Hemavathi [3] proposed Digital signature based key management protocol for secure data transfer in dynamic WSNs and key size also increased upto 1024 bit.It explains identification of authorized users, original content of document and it also verifies packets. Authors done implementation using network simulator -2 (NS-2).…”
Section: E Digital Signature Based Key Managementmentioning
confidence: 99%
“…In general use of sensor network, key management includes two essential aspects: One is establishing pairwise keys, which can be used to protect data delivered between sensors; another is distributing cluster key, which can be used to realize secure data fusion in a cluster.In this paper our focus is more on the security issues of dynamic WSN and our study shed lights on latest developments in dynamic key management in dynamic WSN. There are various types of key management systems proposed in the past such as Secret-sharing-based Key Management[2] ,Digital Signature Based Key Management Protocol [3] ,Certificateless Effective Key Management [4] etc. The remainder of the paper is structured as follows.…”
Section: Introductionmentioning
confidence: 99%