Dynamic key management algorithms in wireless sensor networks: A survey

MS Yousefpoor, H Barati - Computer Communications, 2019 - Elsevier
Wireless sensor networks include a large number of sensor nodes, which perform the
receiving, sending, and processing of the data. Because of the wireless nature of …

A hierarchical key management method for wireless sensor networks

H Barati - Microprocessors and Microsystems, 2022 - Elsevier
It is widely accepted that wireless sensor networks can serve as a powerful infrastructure for
information gathering, processing, and transfer. Since data transfer in these networks is via …

DSKMS: a dynamic smart key management system based on fuzzy logic in wireless sensor networks

MS Yousefpoor, H Barati - Wireless Networks, 2020 - Springer
Wireless sensor networks include a large number of sensor nodes which are developed in
an environment. These networks have military, commercial, industrial, and medical …

Efficient and lightweight protocol for anti-jamming communications in wireless body area networks

F Cherifi, M Omar, T Chenache, S Radji - Computers & Electrical …, 2022 - Elsevier
Abstract Wireless Body Area Networks (WBANs) have emerged as a new technology in
healthcare. However, wireless interfaces make it more vulnerable to acute physical layer …

A key management scheme using (p, q)-lucas polynomials in wireless sensor network

AK Gautam, R Kumar - China Communications, 2021 - ieeexplore.ieee.org
Wireless Sensor Network (WSN) has witnessed an unpredictable growth for the last few
decades. It has many applications in various critical sectors such as real-time monitoring of …

A lightweight and anti‐collusion trust model combined with nodes dynamic relevance for the power internet of things

S Zhao, H Zhao, J Sun - IET Science, Measurement & …, 2023 - Wiley Online Library
A large number of monitoring sensors are introduced in the power grid. However, the
traditional trust models commonly used for edge‐side security management are weak in …

[PDF][PDF] Multi-stage secure clusterhead selection using discrete rule-set against unknown attacks in wireless sensor network

N Tejashwini, DRS Kumar, KS Reddy - International Journal of Electrical …, 2020 - core.ac.uk
Security is the rising concern of the wireless network as there are various forms of
reonfigurable network that is arised from it. Wireless sensor network (WSN) is one such …

Efficient and lightweight group rekeying protocol for communicating things

H Lakhlef, A Bouabdallah - Computers & Electrical Engineering, 2021 - Elsevier
Recent advances in emerging technologies have given birth to a new type of networks
called Internet of Things (IoT). The emergence of IoT has led practitioners to envision …

Secure key management system integrated in cell-LEACH (SKMSI-CL)

S Aissani, B Abbache - Wireless Personal Communications, 2020 - Springer
The existing cryptographic key management mechanisms are implemented as independent
modules, they generate their own messages which consumes considerable energy. The …

DSK: The Proposed Method for Deriving Secret Keys for encrypting of the block in the networks

BJM Jawad, S Al-Alak - 2023 1st International Conference on …, 2023 - ieeexplore.ieee.org
In modern communication systems, sensitive information like financial transactions, personal
records, and government secrets is safeguarded through the use of secret keys. However …