2015
DOI: 10.14257/ijsia.2015.9.11.13
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Key Management Scheme for Wireless Sensor Networks

Abstract: Many key management schemes have been proposed in systematically deployed

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…Hence, we can say that the main steps in key management scheme are: generation, distributed, exchanged, used, abolished and refreshed. There are many key management schemes for the WSNs [4].…”
Section: Overview Of Cryptographymentioning
confidence: 99%
See 4 more Smart Citations
“…Hence, we can say that the main steps in key management scheme are: generation, distributed, exchanged, used, abolished and refreshed. There are many key management schemes for the WSNs [4].…”
Section: Overview Of Cryptographymentioning
confidence: 99%
“…This technique is reliable and rapid fast, but it lacks resilience, scalability and connectivity. The main disadvantage of this scheme is that both parties should exchange the key securely [4]. Asymmetric key (or public key) management uses two different keys at both sides.The key used for encryption i.e.…”
Section: Overview Of Cryptographymentioning
confidence: 99%
See 3 more Smart Citations