2016 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC) 2016
DOI: 10.1109/iccic.2016.7919666
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic and probabilistic key management for distributed wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(10 citation statements)
references
References 16 publications
0
10
0
Order By: Relevance
“…This improved the energy efficiency and the memory of the WSN, but this method solves only the security problems introduced by the key distribution schemes and does not recognize the other security issues, such as replay attack, privileged insider attack, and so on. R.Vijaya Saraswathi et al [3] presented the dynamic and probabilistic key management protocol by developing the flexible network arrangements for security related features. It uses the pair-wise and group key management protocols for the secured transmission.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This improved the energy efficiency and the memory of the WSN, but this method solves only the security problems introduced by the key distribution schemes and does not recognize the other security issues, such as replay attack, privileged insider attack, and so on. R.Vijaya Saraswathi et al [3] presented the dynamic and probabilistic key management protocol by developing the flexible network arrangements for security related features. It uses the pair-wise and group key management protocols for the secured transmission.…”
Section: Related Workmentioning
confidence: 99%
“…• Limitations such as processing, memory constraints, limited network capacity, scarce energy reserves, etc., in WSN make the security enhancement to be vulnerable [14]. • The key pre-distribution solutions cannot be applied to the large-scale WSN [3]. • Key transfer which is done prior before the communication can be challenging in the dynamic network [3].…”
Section: Related Workmentioning
confidence: 99%
“…Thus, sensors utilize diverse key administration strategies for securing a communication. In recently created key management schemes, Researchers proposed different plans such as the bilinear matching in "Dynamic Key Management" (DKM), key administration based on jobs, "Identity Based Key Management" (IBKM), "Random Seed Distribution with Transitory Master Key" (RSDTMK), irregular key circulation [11][12][13][14][15][16].…”
Section: Key Management In Multicast Communicationmentioning
confidence: 99%
“…In the present research, CL-EKM: "Certificateless Key Management" plot which underpins the foundation of 4-kinds of keys. The plan likewise uses fundamental calculations of CL-HSC method [13] in determining certificateless private/public as well as the pairwise keys.…”
Section: Key Management In Multicast Communicationmentioning
confidence: 99%
See 1 more Smart Citation