20
Views
4
CrossRef citations to date
0
Altmetric
Articles

The highly secure polynomial pool-based key pre-distribution scheme for wireless sensor network

&

References

  • R. Blom, “An optimal class of symmetric key generation system,” in Advances in Cryptology - Eurocrypt’ 84, Paris, France, pp.335-338, 1985.
  • L. Eschenauer and D. V. Gligor, “A key-management scheme for distributed sensor networks,” in 9th ACM Conf. Computer Commun. Security, Washington, DC, USA, pp.41-47, 2002.
  • H. Chan, A. Perria and D. Song, “Random key predistribution schemes for sensor networks,” in in Proc. IEEE Symposium Security Privacy, USA, pp.197-213, 2003.
  • C. Blundo, D. Santis, A. Herzberg, S. Kutten, U. Vaccaro and M. Yung, “Perfectly-secure key distribution for dynamic conferences,” information and computation, Vol.146, Issue.1, pp.1-23, 1998.
  • S. Zhu, S. Setia and S. Jajodia, “LEAP: Efficient security mechanisms for large-scale distributed sensor networks,” in ACMCCS 2003,pp.62–72, 2003.
  • W. Du., J. Dena, Y. Han and P. Varshney, “A pair wise key pre-distribution scheme for wireless sensor networks,” ACM Trans. Inf. Syst. Security, vol. 8, no. 2, pp. 228-258, 2005. doi: 10.1145/1065545.1065548
  • Alireza Moussavi and shamsi, “A Polynomial-Based Key Distribution Approach for Wireless Sensor Networks,” Iranian Journal of Science and Technology, vol. 42, no. 1, pp. 13-20, 2018. doi: 10.1007/s40995-017-0330-x
  • P. Ahlawat, M. Dave, “An attack resistant key predistribution scheme for wireless sensor networks.,” Journal of King Saud University – Computer and Information Sciences, pp. 1-13, 2018.
  • S. K. Chhotaray, A. Chhotaray and G. S. Rath, “A new method of generating public key matrix and using it for image encryption,” in 2nd International Conference on Signal Processing and Integrated Networks (SPIN), Noida, pp.453-458,2015.
  • P. Erdős and A. Rényi, “On Random Graphs. I,” Publications Mathematicae, vol. 6, pp. 290-297, 1959.
  • S. Sung, “Multipath key management with aggregators in sensor networks,” in 6th IEEE International Conference on Industrial Informatics, Daejeon, pp.547-550,2008.
  • V. Choudhary and S. Taruna, “A Distributed Key Management Protocol for Wireless Sensor Network,” Communications in Computer and Information Science, vol. 956, pp. 243-256, 2019. doi: 10.1007/978-981-13-3143-5_21
  • A. Kumari, “secure user authentication protocol using elliptic curve cryptography,” Journal of Discrete Mathematical Sciences and Cryptography, vol. 22, pp. 521-530, 2019. doi: 10.1080/09720529.2019.1637155
  • A. Kumar, “An enhanced quantum key distribution protocol for security authentication,” Journal of Discrete Mathematical Sciences and Cryptography, vol. 22, pp. 499-507, 2019. doi: 10.1080/09720529.2019.1637154
  • H. M. Bahig, A. M. Bhery and D. I. Massr, “Cryptanalysis of NTRU where the private polynomial has one or more consecutive zero coefficients,” Journal of Discrete Mathematical Sciences and Cryptography, Vol. 0, pp.1-21, 2019. doi: 10.1080/09720529.2019.1641268
  • Cyan Chen, “A survey of key distribution in wireless sensor networks,” Security Comm. Networks, vol. 7, no. 1, pp. 2495-2508, 2014. doi: 10.1002/sec.354

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.