2013
DOI: 10.5120/10457-5166
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchical Group Key Management using Threshold Cryptography in Wireless Sensor Networks

Abstract: In wireless sensor networks (WSNs), data transmission is secured by authenticating secret keys. Secure key management is most important for network reliability and consistency. In this paper, a hierarchical group key management technique using threshold cryptography in Wireless Sensor Networks is proposed. The technique considers hierarchical sensor network, where sensing nodes are coordinated by forwarding nodes (FN) and in turn they are connected to the BS which is responsible for key computation and distrib… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…Singh Sukhjit et al [12] transmission range. Karan Kansara et al [13]has implemented Sensor based Automated Irrigation System with IOT that reviews the proposed to supports aggressive water management for the agricultural land. Microcontroller in the system promises about increase in systems life by reducing the power consumption resulting in lower power consumption.…”
Section: Literature Surveymentioning
confidence: 99%
“…Singh Sukhjit et al [12] transmission range. Karan Kansara et al [13]has implemented Sensor based Automated Irrigation System with IOT that reviews the proposed to supports aggressive water management for the agricultural land. Microcontroller in the system promises about increase in systems life by reducing the power consumption resulting in lower power consumption.…”
Section: Literature Surveymentioning
confidence: 99%
“…Each node sends a message and receives d messages from its neighbours, that is, d + 1 message by each node. Our solution has a low-complexity communication over other proposed solutions [11,[4][5][6][7][8], moreover, it is deterministic; key connectivity is equal to one (no concept of probability).…”
Section: 1comparison With Some Existing Solutionsmentioning
confidence: 99%
“…A unique public-key is used to verify the signatures of all sensor nodes within the monitored field. Singh et al [10] have proposed a hierarchical group-key management using threshold cryptography for wireless sensor networks. The proposed protocol is a key management technique using threshold cryptography.…”
Section: Introductionmentioning
confidence: 99%