38
Views
0
CrossRef citations to date
0
Altmetric
Articles

Polynomial and matrix based key management security scheme in wireless sensor networks

&

References

  • Dinker A. G. and Sharma V.: Attacks and challenges in wireless sensor networks. 3rd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 3069-3074, New Delhi (2016).
  • Dinker A. G. Sharma V.: Sensor Network Security. Energy Efficient Wireless Sensor Networks. First Ed. CRC in Taylor and Francis, pp. 179-212 (2017).
  • Liu, D., Ning, P. and Li, R.: Establishing pairwise keys in distributed sensor networks. ACM Transactions on Information and System Security (TISSEC), pp.41-77, (2005). doi: 10.1145/1053283.1053287
  • Khan E., Gabidulin E., Honary B., Ahmed H.: Matrix-based memory efficient symmetric key generation and pre-distribution scheme for wireless sensor networks. IET Wireless Sensor System, 2(2), pp. 108– 114, (2012). doi: 10.1049/iet-wss.2011.0097
  • Barnaie F., Seno S. A. H., Seyed A., Aljoufi R.H., & Budiarto R.: MPK-MS: A Matrix-based Pairwise Key Management Scheme for Wireless Sensor Networks. Proceedings of International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), 1(1) pp. 462-467, (2014).
  • Gupta A. and Ahlawat P.: Improved blom key management scheme for wireless sensor network. International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), pp. 1-5, (2014).
  • Delgosha F. & fekri F.: A Multivariate key Establishment Scheme for Wireless Sensor Networks. IEEE trans. on wireless commun. 8(4), pp. 1814-1524, (2009). doi: 10.1109/TWC.2009.071338
  • Mahmood, Z., Ning, H., & Ghafoor, A.: Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks. Sensors, 17(4), pp. 670 (2017). doi: 10.3390/s17040670
  • SelvaReegan A., Baburaj E.: Polynomial and multivariate mapping-based triple-key approach for secure key distribution in wireless sensor networks. J. Computers and Electrical Engineering, vol. 59, Elsevier, pp. 274–290, (2017). doi: 10.1016/j.compeleceng.2016.10.018
  • Hong-Song, Chen, Zhang Jianyu, and H. W. J. Lee. “A novel NP-based security scheme for AODV routing protocol.” Journal of Discrete Mathematical Sciences and Cryptography 11.2 (2008): 131-145. doi: 10.1080/09720529.2008.10698172
  • K, Qian Y, Guizani M, Chen H H.: A framework for a distributed key management scheme in heterogeneous wireless sensor networks. IEEE Trans. on Wireless Communications, 7(2), pp. 639-647, (2008). doi: 10.1109/TWC.2008.060603
  • Kumar, Devender, Harsh Kumar Singh, and Chhahat Ahlawat. “A secure three-factor authentication scheme for wireless sensor networks using ECC.” Journal of Discrete Mathematical Sciences and Cryptography (2019): 1-22. doi: 10.1080/09720529.2019.1627072
  • Wong C. K., Gouda M., Lam S.S.: Secure group communications using key graphs. IEEE/ACM Transactio
  • Yanji P., Kim J., Tariq U., Hong M.: Polynomial-based key management for secure intra-group and inter-group communication. Computers & Mathematics with Applications, 65(9), pp. 1300-1309 (2013). doi: 10.1016/j.camwa.2012.02.008
  • Das, Ashok Kumar. “An unconditionally secure location-aware key management scheme for static sensor networks.” Journal of Discrete Mathematical Sciences and Cryptography 11.3 (2008): 333-355. doi: 10.1080/09720529.2008.10698188

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.