scholarly journals A Hybrid Key Management Scheme for WSNs Based on PPBR and a Tree-Based Path Key Establishment Method

Sensors ◽  
2016 ◽  
Vol 16 (4) ◽  
pp. 509 ◽  
Author(s):  
Ying Zhang ◽  
Jixing Liang ◽  
Bingxin Zheng ◽  
Wei Chen
2013 ◽  
Vol 756-759 ◽  
pp. 332-337 ◽  
Author(s):  
Xiao Ling Sun ◽  
Xu Guang Sun ◽  
Shan Shan Li ◽  
Fu Ming Chen ◽  
Qiu Ge Yang

In order to obtain the availability of roads and bridges after earthquake, a real-time monitoring system is build by wireless sensor networks. And a new key management scheme is proposed to protect the safety of the system. The scheme is based on the polynomial and the Chinese Remainder Theorem, divided into three stages which are system initialization, key establishment, node join and revocation. Analysis shows that the new scheme greatly reduces the storage space and the energy consumption of calculation and communication of node. It is suitable for post-disaster road monitoring system.


2013 ◽  
Vol 2 (2) ◽  
pp. 23-31
Author(s):  
Sufyan T. Faraj Al-janabi ◽  
Ali J. Dawood ◽  
Ekram H. Hassan

2010 ◽  
Vol 21 (3) ◽  
pp. 516-527 ◽  
Author(s):  
Ting YUAN ◽  
Jian-Qing MA ◽  
Yi-Ping ZHONG ◽  
Shi-Yong ZHANG

Author(s):  
Tong Chen ◽  
Lei Zhang ◽  
Kim-Kwang Raymond Choo ◽  
Rui Zhang ◽  
Xinyu Meng

Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 2962
Author(s):  
Xingda Chen ◽  
Margaret Lech ◽  
Liuping Wang

Security is one of the major concerns of the Internet of Things (IoT) wireless technologies. LoRaWAN is one of the emerging Low Power Wide Area Networks being developed for IoT applications. The latest LoRaWAN release v.1.1 has provided a security framework that includes data confidentiality protection, data integrity check, device authentication and key management. However, its key management part is only ambiguously defined. In this paper, a complete key management scheme is proposed for LoRaWAN. The scheme addresses key updating, key generation, key backup, and key backward compatibility. The proposed scheme was shown not only to enhance the current LoRaWAN standard, but also to meet the primary design consideration of LoRaWAN, i.e., low power consumption.


2011 ◽  
Vol 1 ◽  
pp. 295-299
Author(s):  
Jun Wu ◽  
Run Hua Shi ◽  
Hong Zhong

This paper proposes a hierarchical key management scheme in the mobile Ad hoc networks. In this scheme, there are two kinds of server nodes: the special server nodes and the ordinary server nodes, such that only when two kinds of server nodes collaborate can they provide a certificate service. In order to satisfy this special application, we design a new secret sharing scheme for splitting the system private key, in which it generates two different kinds of shares of the system private key: the special share and the ordinary share, where it needs at least one special share and t ordinary shares to recover the system private key, thus we call it threshold scheme. Furthermore, we present a distributed signature scheme for a user’s certificate in the mobile Ad hoc networks based on this secret sharing.


Sign in / Sign up

Export Citation Format

Share Document