Proceedings of the International Conference on Information and Communication Technology 2019
DOI: 10.1145/3321289.3321320
|View full text |Cite
|
Sign up to set email alerts
|

Secret key generation in wireless sensor network using public key encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…To ensure that the keys generated by this methodology are indeed random, the NIST statistical test suite is used. [7] proposed a Secret Key Generation (SKG) protocol to extend the network lifetime while maintaining WSN security. The SKG protocol distributes a portion of the secret key among the network's sensor nodes while the remainder is kept on the WSN nodes.…”
Section: Related Workmentioning
confidence: 99%
“…To ensure that the keys generated by this methodology are indeed random, the NIST statistical test suite is used. [7] proposed a Secret Key Generation (SKG) protocol to extend the network lifetime while maintaining WSN security. The SKG protocol distributes a portion of the secret key among the network's sensor nodes while the remainder is kept on the WSN nodes.…”
Section: Related Workmentioning
confidence: 99%
“…Network lifetime needs to be maintained to provide security in WSN. The Secret Key Generation (SKG) protocol was proposed by Bashaa et al [36] and evaluated using an NS2 simulator. The protocol maximized the throughput and minimized the power consumption during key distribution thus extending the lifetime of WSN.…”
Section: Literature Surveymentioning
confidence: 99%
“…• Identify impersonation occurrence • XOR operation and hash function implemented [36] • Mutual authentication • Simulation tool ProVerif (2.0)…”
Section: Development Of User Biometric Authenticationmentioning
confidence: 99%
“…Traditional public-key cryptography is appropriate in cryptography since it does not need the sender and receiver to exchange the same secret in order to communicate safely [5]. However, because they frequently rely on sophisticated mathematical calculations, they don't always perform as well as symmetric-key cryptography.…”
Section: Introductionmentioning
confidence: 99%