2018 10th International Conference on Communication Systems &Amp; Networks (COMSNETS) 2018
DOI: 10.1109/comsnets.2018.8328198
|View full text |Cite
|
Sign up to set email alerts
|

PKSN: A pairing based key management scheme for heterogeneous sensor network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…Te strand space model is a formal model used to analyze security protocols. Tis model can efectively analyze protocol security and realize mutual authentication between communication parties in the protocol [17,18].…”
Section: Formal Security Analysis Using the Strand Space Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…Te strand space model is a formal model used to analyze security protocols. Tis model can efectively analyze protocol security and realize mutual authentication between communication parties in the protocol [17,18].…”
Section: Formal Security Analysis Using the Strand Space Modelmentioning
confidence: 99%
“…(1) Name aggregate T name , which includes UE and gNB t (2) Suppose the strand space is Σ, s, t, P ∈Σ [17], there is a normal node m, m ′ ∈ C, so that C UE is the component of m and m⇒m ′ is a transformed edge of r u . Similarly, there is a normal node n, n ′ ∈ C, so that X UE is the component of n and n⇒n ′ is a transformed edge of f u .…”
Section: Formal Security Analysis Using the Strand Space Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Buragohain and Sarma [24] used a bilinear pairing named PKHSN for key management. They maintain four different keys to manage different levels of confidentiality in the WSN.…”
Section: G Cryptographic Based Workmentioning
confidence: 99%
“…These keys are: the global key, which is used to encrypt messages broadcast inside the entire WSN, a cluster key for communication within a cluster between the CH and sensor nodes, a shared pairwise key to manage communication between nodes, and an individual key for direct communication between the sensor node and the BS. Storage optimization is a decisive factor in WSN, although in [24] has successfully managed the key generation and transmission, their work requires larger memory space than afforded in sensor nodes.…”
Section: G Cryptographic Based Workmentioning
confidence: 99%