SHSDA: secure hybrid structure data aggregation method in wireless sensor networks

M Naghibi, H Barati - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
Wireless sensor networks (WSNs) are composed of several nodes, distributed in a
geographical region. Limited energy of nodes is the main challenge of WSNs. Hence, it is …

A new hierarchical architecture and protocol for key distribution in the context of IoT-based smart cities

O AbuAlghanam, M Qatawneh, W Almobaideen… - Journal of Information …, 2022 - Elsevier
Abstract The Internet of Things (IoT) is a system of objects such as traditional computers,
cameras, sensors and other things that are interconnected via a network to gather, process …

A decentralized blockchain-based key management protocol for heterogeneous and dynamic IoT devices

MA Kandi, DE Kouicem, M Doudou, H Lakhlef… - Computer …, 2022 - Elsevier
Secure communication is one of the main challenges that are slowing down the
development of the Internet of Things (IoT). Key Management (KM) is particularly a difficult …

A robust and efficient vector-based key management scheme for IoT networks

S Bettayeb, ML Messai, SM Hemam - Ad Hoc Networks, 2023 - Elsevier
Abstract Information and communication security is a critical concern in the rapid growth of
Internet of Things (IoT) networks that need to exchange sensitive data. Therefore, key …

A versatile Key Management protocol for secure Group and Device-to-Device Communication in the Internet of Things

MA Kandi, H Lakhlef, A Bouabdallah… - Journal of Network and …, 2020 - Elsevier
Abstract The Internet of Things (IoT) is a network made up of a large number of devices that
collaborate to provide various service for the benefit of society. Two communication modes …

Key establishment scheme for wireless sensor networks based on polynomial and random key predistribution scheme

J Zhang, H Li, J Li - Ad Hoc Networks, 2018 - Elsevier
Establishing communication keys for pairs of neighbouring sensor nodes is the foundation of
the security in wireless sensor networks (WSNs). However, due to the resource constraints …

LSTR: lightweight and secure tree-based routing for wireless sensor networks

K Hamouid, S Othmen, A Barkat - Wireless Personal Communications, 2020 - Springer
This paper proposes a Lightweight and Secure Tree-based Routing protocol (LSTR) for
Wireless Sensor Networks. The security of data routing from sensor nodes to the Base …

Efficient and secure key distribution protocol for wireless sensor networks

MR Alshammari, KM Elleithy - Sensors, 2018 - mdpi.com
Modern wireless sensor networks have adopted the IEEE 802.15. 4 standard. This standard
defines the first two layers, the physical and medium access control layers; determines the …

A blockchain-based key management protocol for secure device-to-device communication in the Internet of Things

MA Kandi, DE Kouicem, H Lakhlef… - 2020 IEEE 19th …, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is an emerging technology that aims to extend connectivity to all
everyday devices. One of the main challenges that are slowing down its development is how …

Polynomial and matrix based key management security scheme in wireless sensor networks

AG Dinker, V Sharma - Journal of Discrete Mathematical Sciences …, 2019 - Taylor & Francis
Wireless sensor networks (WSN) due to its constrained resources and wide application in
different fields like in military area and battlefield has brought the focus on the …