Simple and Efficient Key Management Method for Hierarchical Wireless Sensor Networks
Abstract
Keywords
References
T. Qiu, N. Chen, K. Li, D. Qiao, and Z. Fu, “Heterogeneous ad hoc networks: Architectures, advances and challenges,” Ad Hoc Networks, vol. 55, pp. 143–152, 2017.
M. M. Afsar and M.-H. Tayarani-N, “Clustering in sensor networks: A literature survey,” Journal of Network and Computer applications, vol. 46, pp. 198–226, 2014.
M. A. Altaha, A. A. Alkadhmawee, and W. M. Lafta, “Uneven clustering and fuzzy logic based energyefficient wireless sensor networks,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 25, no. 2, pp. 1011–1019, 2022.
X. He, M. Niedermeier, and H. De Meer, “Dynamic key management in wireless sensor networks: A survey,” Journal of network and computer applications, vol. 36, no. 2, pp. 611–622, 2013.
S. Abdollahzadeh and N. J. Navimipour, “Deployment strategies in the wireless sensor network: A comprehensive review,” Computer Communications, vol. 91, pp. 1–16, 2016.
A. A. Alkadhmawee, M. A. Altaha, and W. M. Lafta, “Unequal clustering algorithm with ida* multi-hop routing to prevent hot spot problem in wsns,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 20, no. 1, pp. 445–453, 2020.
R. Di Pietro, S. Guarino, N. V. Verde, and J. Domingo-Ferrer, “Security in wireless ad-hoc networks–a survey,” Computer Communications, vol. 51, pp. 1–20, 2014.
A. Albakri, L. Harn, and S. Song, “Hierarchical key management scheme with probabilistic security in a wireless sensor network (wsn),” Security and communication networks, vol. 2019, no. 1, p. 3950129, 2019.
S. P. Singh and S. C. Sharma, “A survey on cluster based routing protocols in wireless sensor networks,”Procedia computer science, vol. 45, pp. 687–695, 2015.
L. Chen, J. Ji, and Z. Zhang, Wireless network security. Springer, 2013.
Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao, “A survey on security and privacy issues in internet-of-things,”IEEE Internet of things Journal, vol. 4, no. 5, pp. 1250–1258, 2017.
M. A. El-Bendary, Developing security tools of WSN and WBAN networks applications. Springer, 2015.
J.-M. Huang, S.-B. Yang, and C.-L. Dai, “An efficient key management scheme for data-centric storage wireless sensor networks,” IERI Procedia, vol. 4, pp. 25–31, 2013.
G.-C. Yang, S.-l. Ao, and L. An, IAENG transactions on engineering technologies. Springer, 2015.
Y. Wang and J. Zhao, “Key management scheme for wireless sensor networks,” in Wireless Internet: 10th International Conference, WiCON 2017, Tianjin, China, December 16-17, 2017, Proceedings 10. Springer, 2018, pp. 272–283.
L.-C. Wuu, C.-H. Hung, and C.-M. Chang, “Quorum-based key management scheme in wireless sensor networks,” in Proceedings of the 6th international conference on ubiquitous information management and communication, 2012, pp. 1–6.
B. Daghighi, M. L. Mat Kiah, S. Iqbal, M. H. U. Rehman, and K. Martin, “Host mobility key management in dynamic secure group communication,” Wireless Networks, vol. 24, pp. 3009–3027, 2018.
M. Anzani, H. Haj Seyyed Javadi, and V. Modirir, “Key-management scheme for wireless sensor networks based on merging blocks of symmetric design,” Wireless Networks, vol. 24, pp. 2867–2879, 2018.
M. A. Al-taha and A. M. Ra’ad, “Lightweight key management scheme for hierarchical wireless sensor networks,” in Proceedings of 7th International Conference on Computer Science, Engineering & Applications (ICCSEA 2017). Aircc Publishing Corporation, 2017, pp. 139–147.
M. S. Yousefpoor and H. Barati, “Dskms: a dynamic smart key management system based on fuzzy logic in wireless sensor networks,” Wireless Networks, vol. 26, no. 4, pp. 2515–2535, 2020.
A. Singh, A. K. Awasthi, and K. Singh, “Lightweight multilevel key management scheme for large scale wireless sensor network,” in 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom). IEEE, 2016, pp. 3014–3017.
Q. Cheng, C. Hsu, and L. Harn, “Lightweight noninteractive membership authentication and group key establishment for wsns,” Mathematical Problems in Engineering, vol. 2020, no. 1, p. 1452546, 2020.
A. Helali, A. Msolli, H. Maaref, and R. Mghaieth, “Kmph: Key management scheme based on pool-hash for wsn,” Journal of Circuits, Systems and Computers, vol. 30, no. 01, p. 2150003, 2021.
V. Arumugam, A. Seshasayanam et al., “An adaptive multilevel location based key management system for dynamic wireless sensor networks,” International Journal of Applied Science and Engineering, vol. 18, no. 1, pp. 1–11, 2021.
V. Kumar, N. Malik, G. Dhiman, and T. K. Lohani, “Scalable and storage efficient dynamic key management scheme for wireless sensor network,” Wireless Communications and Mobile Computing, vol. 2021, pp. 1–11, 2021.
P. Ahlawat and M. Dave, “Secure path key establishment schemes based on random key management for wsn,” Proceedings of the National Academy of Sciences, India Section A: Physical Sciences, vol. 91, pp. 555–567, 2021.
C. Shorten and T. M. Khoshgoftaar, “A survey on image data augmentation for deep learning,” Journal of big data, vol. 6, no. 1, pp. 1–48, 2019.
Refbacks
- There are currently no refbacks.
Indonesian Journal of Electrical Engineering and Informatics (IJEEI)
ISSN 2089-3272
This work is licensed under a Creative Commons Attribution 4.0 International License.