43
Views
1
CrossRef citations to date
0
Altmetric
Review Article

A Scalable Key Pre-distribution Scheme based on the Unital Design for the Internet of Things Security

, ORCID Icon, ORCID Icon &

References

  • M. Saadeh, Z. Sleit, M. Qatawneh, and W. Almobaideen, “Authentication techniques for the internet of things: A Survey,” in Cybersecurity and Cyberforensics Conference, Amman, Jordan, 2016.
  • T. Kavitha, and D. Sridharan, “Hybrid design of scalable key distribution for wireless sensor networks,” Int. J. Eng. Technol., Vol. 2, no. 2, pp. 136–141, 2010.
  • S. A. Camtepe, and B. Yener, “Combinatorial design of key distribution mechanisms for wireless sensor networks,” IEEE/ACM Trans. Networking, Vol. 15, no. 2, pp. 346–358, 2007.
  • T. Dargahi, H. H. S. Javadi, and M. Hosseinzade, “Application-specific hybrid symmetric design of key pre-distribution for wireless sensor networks,” Secur. Comm. Netw., Vol. 8, no. 8, pp. 1561–1574, 2015.
  • D. Liu, P. Ning, and R. Li, “Establishing pairwise keys in distributed sensor networks,” ACM Trans. Inform. Syst. Secur., Vol. 8, no. 1, pp. 41–77, 2005.
  • S. N. Swamy, D. Jadhav, and N. Kulkarni, “Seucrity threats in the application layer in IOT applications,” in International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 2017.
  • S. Rizvi, A. Kurtz, J. Pfeffer, and M. Rizvi, “Securing the internet of things (IoT): A security taxonomy for IoT,” in 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, New York, NY, USA, 2018.
  • Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao, “A survey on security and privacy issues in internet-of-things,” IEEE Internet Things J., Vol. 4, no. 5, pp. 1250–1258, 2017.
  • L. Eschenauer, and V. D. Gligor, “A key-management scheme for distributed sensor networks,” in Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, 2002.
  • H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensore networks,” in Symposium on Security and Privacy, Berkeley, CA, USA, 2003.
  • S. Qian, “A novel key pre-distribution for wireless sensor networks,” in International Conference on Solid State Devices and Materials Science, 2012.
  • A. Kumar, N. Bansal, and A. R. Pais, “New key pre-distribution scheme based on combinatorial design for wireless sensor networks,” IET Commun., Vol. 13, no. 7, pp. 892–897, 2019.
  • G. Gaubatz, J.-P. Kaps, E. Ozturk, and B. Sunar, “State of the art in ultra-low power public key cryptography for wireless sensor networks,” in Third IEEE International Conference on Pervasive Computing and Communications Workshops, Kauai Island, 2005.
  • J. Granjal, E. Monteiro, and J. Silva. “End-to-end transport-layer security for internet-integrated sensing applications with mutual and delegated ECC public-key authentication,” in IFIP Networking Conference, Brooklyn, NY, 2013.
  • M. Anzani, H. Haj Seyyed Javadi, and A. Moeni, “A deterministic key predistribution method for wireless sensor networks based on hypercube multivariate scheme,” Iran. J. Sci. Technol. Trans. A Sci., Vol. 42, no. 2, pp. 777–786, 2018.
  • M. Javanbakht, H. Erfani, H. Haj Seyyed Javadi, and P. Daneshjoo, “Key predistribution scheme for clustered hierarchical wireless sensor networks based on combinatorial designs,” Secur. Commun. Netw., Vol. 7, no. 11, pp. 2003–2014, 2014.
  • V. Modiri, H. Haj Seyyed Javadi, and M. Anzani, “A novel scalable key pre-distribution scheme for wireless sensor networks based on residual design,” Wirel. Pers. Commun., Vol. 96, no. 2, pp. 2821–2841, 2017.
  • H. Haj Seyyed Javadi, and M. Anzani, “Hybrid key pre-distribution scheme for wireless sensor network based on combinatorial design,” J. Adv. Comp. Eng. Technol., Vol. 1, no. 3, pp. 33–38, 2015.
  • A. Dey. Theory of block designs. New York: J. Wiley, 1986.
  • C. J. Colbourn, and J. H. Dinitz. Handbook of combinatorial designs. New York: CRC press, 2010.
  • C. J. Colbourn, and J. Dinitz. The CRC handbook of combinatorial designs. New York: CRC Press, 1996.
  • A. Al-Azemi, A. Betten, and D. Bett, “Unital designs with blocking sets,” Discrete Appl. Math., Vol. 163, pp. 102–112, 2014.
  • H. R. Sharifi, H. Haj Seyyed Javadi, A. Moeini, and M. Hosseinzadeh, “Unital design based sink location service for wireless sensor networks,” IEEE. Access., Vol. 6, pp. 28733–28745, 2018.
  • C. Xu, and W. Liu, “Key updating methods for combinatorial design based key management schemes,” J. Sensors, Vol. 2014, pp. 1–8, 2014.
  • V. Naresh, and N. V. Kumar, “Key pre-distribution using unital design for wireless sensor network,” Int. J. Res. Adv. Eng. Technol., Vol. 2, no. 3, pp. 1–10, 2014.
  • S. Ruj, A. Nayak, and I. Stojmenovic, “Pairwise and triple key distribution in wireless sensor networks with applications,” IEEE Trans. Comput., Vol. 62, no. 11, pp. 2224–2237, 2013.
  • Q. Yuan, C. Ma, H. Yu, and X. Bian, “A key pre-distribution scheme based on µ-PBIBD for enhancing resilience in wireless sensor networks,” Sensors (Basel), Vol. 18, no. 5, pp. 1539, 2018.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.