2020
DOI: 10.17559/tv-20170807075015
|View full text |Cite
|
Sign up to set email alerts
|

Polynomial Based Dynamic Key Management for Secure Cluster Communication in Wireless Mobile Sensor Network

Abstract: For inter and intra cluster communication, member nodes jointly build a mutual session key called cluster key to allow secure communication. Most existing schemes for cluster key management use messages exchange among the member nodes within a cluster for the new cluster key establishment when a node leaves or joins a cluster. This causes significant communication and computation costs. Furthermore, the secure distribution of cluster keys among member nodes in frequently changing environments is a difficult ta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…For a static timetable, low resource usage is accomplished and computing overhead is often reduced with this method. The recognition of multi-dimensional network replica nodes [29][30][31][32]. The analyst served mostly with the IoT networks have established a protection measure to secure the WSN from a comprehensive hybrid mechanism replica node attack.…”
Section: Related Workmentioning
confidence: 99%
“…For a static timetable, low resource usage is accomplished and computing overhead is often reduced with this method. The recognition of multi-dimensional network replica nodes [29][30][31][32]. The analyst served mostly with the IoT networks have established a protection measure to secure the WSN from a comprehensive hybrid mechanism replica node attack.…”
Section: Related Workmentioning
confidence: 99%
“…Rehman et al [10] introduced the concept of key management scheme based on polynomial approach for securing data transmission in WSN. Whenever the network changes happen, polynomial approach was adopted to protect the data and support network scalability.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The following protocols and schemes like CEEA [9], PDKM [10], and TEMOHOA [16] are compared with proposed protocol QLAMSR.…”
Section: Proposed Packet Formatmentioning
confidence: 99%