4.7 Article

A dynamic and multi-level key management method in wireless sensor networks (WSNs)

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Engineering, Electrical & Electronic

A hierarchical key management and authentication method for wireless sensor networks

Pourya Alimoradi et al.

Summary: This paper presents a hierarchical key management method for wireless sensor networks, which involves zone partitioning, key generation, and authentication steps to enhance network security effectively. The proposed method shows better performance compared to other existing methods.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2022)

Article Computer Science, Information Systems

Achieving One-Round Password-Based Authenticated Key Exchange over Lattices

Zengpeng Li et al.

Summary: In this research, we propose a lattice-based one-round PAKE protocol with adaptive smoothness by introducing a lattice-based SPHF. We integrate the proposed SPHF into an existing one-round framework and provide rigorous security analysis. Furthermore, we explore the possibilities of achieving two-round PAKE and universal composable security, and demonstrate the potential application in the Internet of Things.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

Article Computer Science, Hardware & Architecture

A hierarchical key management method for wireless sensor networks

Kokab Havashemi Rezaeipour et al.

Summary: This paper presents a key management protocol for wireless sensor networks that provides improved flexibility and network lifetime, with lower power consumption and memory usage, through hierarchical encryption and area management.

MICROPROCESSORS AND MICROSYSTEMS (2022)

Article Computer Science, Information Systems

An Authentication-Based Secure Data Aggregation Method in Internet of Things

Maryam Ataei Nezhad et al.

Summary: The Internet of Things (IoT) allows for the connection and remote management of different devices through the internet. In this paper, a three-phase method is proposed to address privacy and information security concerns. The method includes constructing star structures, encrypting data with unique keys, and using an authentication protocol to enhance security.

JOURNAL OF GRID COMPUTING (2022)

Article Computer Science, Theory & Methods

A secure three-factor authentication scheme for IoT environments

AmirHossein Ghafouri Mirsaraei et al.

Summary: This paper proposes a three-factor-based authentication scheme for the IoT on the blockchain platform. The scheme utilizes smart card registration for user authorization and implements mutual authentication without the need for a trustable server. It has been shown to be secure and efficient in terms of computational and communications costs.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2022)

Article Computer Science, Artificial Intelligence

Security protocol using elliptic curve cryptography algorithm for wireless sensor networks

Rosheen Qazi et al.

Summary: Information security is essential in the modern technological world, with a focus on protecting data from unauthorized access. Wireless Sensor Networks pose unique security challenges, requiring innovative approaches for ensuring secure communication.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2021)

Article Computer Science, Hardware & Architecture

KMPH: Key Management Scheme Based on Pool-Hash for WSN

Abdelhamid Helali et al.

Summary: Wireless sensor networks have gained increasing attention for ensuring security, with a proposed scheme to distribute secure keys due to constraints in sensor nodes.

JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS (2021)

Article Computer Science, Information Systems

Password-authenticated searchable encryption

Liqun Chen et al.

Summary: PASE is a novel searchable encryption scheme that allows users to outsource encrypted data to servers using a single human-memorizable password. It ensures that only legitimate users can perform operations and improves device compatibility by eliminating the need for high-entropy key storage on the client side.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2021)

Article Computer Science, Information Systems

A Secure Scheme Based on One-Way Associated Key Management Model in Wireless Sensor Networks

Sujun Li et al.

Summary: The article proposes a one-way associated key management model that has better adaptability in multiphase sensor networks, dynamically adjusting the number of keys allocated based on different deployment errors to improve network performance stability. Analysis and simulation indicate that this scheme outperforms related schemes in applications where deployment error changes.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks

Osama A. Khashan et al.

Summary: This paper introduces the FlexCrypt scheme, which addresses the challenges of security and efficiency in WSNs by introducing features such as dynamic clustering and automated selection of encryption parameters, as well as providing flexible key management and authentication methods.

AD HOC NETWORKS (2021)

Article Computer Science, Hardware & Architecture

Secure authenticated key exchange for WSNs in IoT applications

Mingping Qi et al.

Summary: The authors propose a two-factor AKE protocol using ECC for WSNs in the context of IoT, allowing direct information exchange between end users and sensor nodes after a secure link is established. The new protocol shows good security attributes and resistance to attacks, as well as certain efficiency advantages in computation and communication costs.

JOURNAL OF SUPERCOMPUTING (2021)

Article Computer Science, Information Systems

A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks

Efat Yousefpoor et al.

Summary: This paper presents a three-phase secure data aggregation method, including intra-cluster data aggregation, inter-cluster data aggregation, and data transfer. The secure connection between sensor nodes is ensured using the dragonfly algorithm and columnar transposition cipher method, and a symmetric lightweight encryption based on modified RNS is provided. Experimental results demonstrate that this data aggregation scheme outperforms others in terms of network lifetime, delay, and packet delivery rate.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2021)

Article Computer Science, Information Systems

PROTECT: Efficient Password-Based Threshold Single-Sign-On Authentication for Mobile Users against Perpetual Leakage

Yuan Zhang et al.

Summary: PROTECT is a password-based threshold single-sign-on authentication scheme that effectively defends against adversaries compromising identity servers, supports key renewal to resist secret leakage, and efficiently combats offline DGA, online DGA, and password testing attacks. Performance evaluation demonstrates high efficiency on the user side for PROTECT.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2021)

Review Computer Science, Hardware & Architecture

Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review

Mohammad Sadegh Yousefpoor et al.

Summary: This paper introduces secure data aggregation schemes in wireless sensor networks, categorizes them based on various criteria, aiming to help researchers design secure and efficient data aggregation methods. Familiarity with new techniques and challenges in this field can guide future research directions.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2021)

Review Multidisciplinary Sciences

A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks

Amit Kumar Gautam et al.

Summary: Wireless sensor networks (WSN) are widely used in various critical applications, and research in key management, authentication, and trust management in WSN is an active area. This paper conducts a detailed survey to explore how different security schemes can be applied to specific applications, aiming to find the optimal security solution.

SN APPLIED SCIENCES (2021)

Article Computer Science, Information Systems

DSKMS: a dynamic smart key management system based on fuzzy logic in wireless sensor networks

Mohammad Sadegh Yousefpoor et al.

WIRELESS NETWORKS (2020)

Article Computer Science, Information Systems

Matrix-based key management scheme for IoT networks

Mohammed Nafi et al.

AD HOC NETWORKS (2020)

Article Computer Science, Hardware & Architecture

A versatile Key Management protocol for secure Group and Device-to-Device Communication in the Internet of Things

Mohamed Ali Kandi et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Article Automation & Control Systems

A Blockchain-Based Secure Key Management Scheme With Trustworthiness in DWSNs

Youliang Tian et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Engineering, Electrical & Electronic

Unified Biometric Privacy Preserving Three-Factor Authentication and Key Agreement for Cloud-Assisted Autonomous Vehicles

Qi Jiang et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Computer Science, Theory & Methods

LVID: A Multimodal Biometrics Authentication System on Smartphones

Libing Wu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Theory & Methods

EDAK: An Efficient Dynamic Authentication and Key Management Mechanism for heterogeneous WSNs

Samir Athmani et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Engineering, Electrical & Electronic

SKWN: Smart and dynamic key management scheme for wireless sensor networks

Samira Mesmoudi et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2019)

Article Telecommunications

MTPKM: Multipart Trust Based Public Key Management Technique to Reduce Security Vulnerability in Mobile Ad-Hoc Networks

Y. Harold Robinson et al.

WIRELESS PERSONAL COMMUNICATIONS (2019)

Review Computer Science, Information Systems

Dynamic key management algorithms in wireless sensor networks: A survey

Mohammad Sadegh Yousefpoor et al.

COMPUTER COMMUNICATIONS (2019)

Article Computer Science, Information Systems

A Dynamic Privacy-Preserving Key Management Protocol for V2G in Social Internet of Things

Kisung Park et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey

Amrita Ghosal et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

A security-enhanced mutual authentication scheme with privacy protected in wireless sensor networks

Haitao Yu et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)

Article Automation & Control Systems

Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks

Ding Wang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Hardware & Architecture

Efficient and energy-aware key management framework for dynamic sensor networks

Mawloud Omar et al.

COMPUTERS & ELECTRICAL ENGINEERING (2018)

Proceedings Paper Computer Science, Theory & Methods

An attack model based highly secure key management scheme for wireless sensor networks

Priyanka Ahlawat et al.

6TH INTERNATIONAL CONFERENCE ON SMART COMPUTING AND COMMUNICATIONS (2018)

Review Computer Science, Information Systems

A collusion-resistant dynamic key management scheme for WSNs

Furui Zhan et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Article Computer Science, Hardware & Architecture

Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment

Ding Wang et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2015)

Article Computer Science, Information Systems

A dynamic key management scheme for dynamic wireless sensor networks

Seyed Hossein Erfani et al.

SECURITY AND COMMUNICATION NETWORKS (2015)