2019
DOI: 10.1080/09720529.2019.1695904
|View full text |Cite
|
Sign up to set email alerts
|

Polynomial and matrix based key management security scheme in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…Dinkar et al proposed a key distribution scheme that is based on symmetric polynomials using a multivariate framework [87]. In this proposition, known as the hybrid key management security scheme (HKMSS), the keys shared between the central node (i.e., the sink node) and the cluster heads are derived using symmetric polynomials and matrices.…”
Section: Jing Et Al Present a Fully Homomorphic Encryption-based Key ...mentioning
confidence: 99%
“…Dinkar et al proposed a key distribution scheme that is based on symmetric polynomials using a multivariate framework [87]. In this proposition, known as the hybrid key management security scheme (HKMSS), the keys shared between the central node (i.e., the sink node) and the cluster heads are derived using symmetric polynomials and matrices.…”
Section: Jing Et Al Present a Fully Homomorphic Encryption-based Key ...mentioning
confidence: 99%
“…Dinker et al [43] proposed a multivariate symmetric polynomial and matrix-based key management scheme. This scheme uses polynomial and matrix to generate keys between the sink node and the cluster head.…”
Section: Polynomials Based Key Management Schemesmentioning
confidence: 99%
“…Some schemes 18 use different paradigms to distribute the keys, such as the use of mobile-agents capable of moving inside and distribute the cluster key dynamically and with reduced energy consumption. Alternative schemes use the key-matrix based dynamic key generation, 19 the identity-based encryption 20 and the threshold cryptography 21 to manage and distribute keys while reducing the energy consumption.…”
Section: Introductionmentioning
confidence: 99%