2018
DOI: 10.3390/s18103569
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and Secure Key Distribution Protocol for Wireless Sensor Networks

Abstract: Modern wireless sensor networks have adopted the IEEE 802.15.4 standard. This standard defines the first two layers, the physical and medium access control layers; determines the radio wave used for communication; and defines the 128-bit advanced encryption standard (AES-128) for encrypting and validating the transmitted data. However, the standard does not specify how to manage, store, or distribute the encryption keys. Many solutions have been proposed to address this problem, but the majority are impractica… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 34 publications
0
8
0
Order By: Relevance
“…Moreover, a key distribution protocol has been utilized in the paper [14] for securing the resourceconstrained WSNs. The results exhibited that the used protocol is secure and effective than the traditional methods.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, a key distribution protocol has been utilized in the paper [14] for securing the resourceconstrained WSNs. The results exhibited that the used protocol is secure and effective than the traditional methods.…”
Section: Related Workmentioning
confidence: 99%
“…The conventional system [14] has a drawback in terms of energy consumption in WSN. The minimum resources in Base Station (BS) and WSN lead to more energy consumption.…”
Section: Security Issuesmentioning
confidence: 99%
“…AlShammari and Elliethy [46] proposed a key distribution protocol for WSNs. Their protocol aims to distribute a symmetric key to a group of nodes to secure its communications.…”
Section: Related Workmentioning
confidence: 99%
“…The attacker applied a node capture attack [7,8,9] through confiscating few vertices over WSN to use vertices information maliciously. The information about routing strategies, cipher keys and cipher text are to be utilized spitefully by attacker [10,11,12].…”
Section: Introductionmentioning
confidence: 99%