scispace - formally typeset
Proceedings ArticleDOI

A Hierarchical Key Establishment Scheme forWireless Sensor Networks

TLDR
Simulation results show that HIKES provides an efficient and scalable solution to the key management problem and shows robustness against most known routing attacks.
Abstract
This paper presents hierarchical key establishment scheme (HIKES) for wireless sensor networks. In this scheme, the base station, acting as the central trust authority, empowers randomly selected sensors to act as local trust authorities authenticating on its behalf the cluster members and issuing all secret keys. HIKES uses a partial key escrow scheme that enables any sensor node selected as a cluster head to generate all the cryptographic keys needed to authenticate other sensors within its cluster. This scheme localizes authentication and key distribution, thereby reducing the communication cost with the base station. HIKES also provides one-step broadcast authentication mechanism and shows robustness against most known routing attacks. Simulation results show that HIKES provides an efficient and scalable solution to the key management problem.

read more

Citations
More filters
Journal ArticleDOI

A medical records managing and securing blockchain based system supported by a Genetic Algorithm and Discrete Wavelet Transform

TL;DR: A blockchain-based data sharing system is proposed to tackle the issue of privacy of patients, which employs immutability and autonomy properties of the blockchain to sufficiently resolve challenges associated with access control and handle sensitive data.
Journal ArticleDOI

ICMDS: Secure inter-cluster multiple-key distribution scheme for wireless sensor networks

TL;DR: This work proposes a mechanism termed ICMDS (Inter-Cluster Multiple Key Distribution Scheme for Wireless Sensor Networks), which enables the securing of the entire network and uses two phases of security implementations for the sensor node's authenticity while communicating with the CH.
Journal ArticleDOI

Efficient mobile sensor authentication in smart home and WPAN

TL;DR: This work extends the novel and efficient node authentication and key exchange protocol that support Irregular distribution that has only a third of communication and computational overhead.
Journal ArticleDOI

Untraceable Mobile Node Authentication in WSN

TL;DR: This paper proposes the efficient node authentication and key exchange protocol that reduces the overhead in node re-authentication and also provides untraceability of mobile nodes and has only a third of communication and computational overhead.
Journal ArticleDOI

Effect of Augmented Reality Contents Based Instruction on Academic Achievement, Interest and Flow of Learning

TL;DR: The results are summarized as follows: First, there is a significant difference in academic achievement between two groups, and in the interest of lessons taken by students themselves, augmented reality based instruction is more effective than textbook based instruction.
References
More filters
Proceedings ArticleDOI

Energy-efficient communication protocol for wireless microsensor networks

TL;DR: The Low-Energy Adaptive Clustering Hierarchy (LEACH) as mentioned in this paper is a clustering-based protocol that utilizes randomized rotation of local cluster based station (cluster-heads) to evenly distribute the energy load among the sensors in the network.

Energy-efficient communication protocols for wireless microsensor networks

TL;DR: LEACH (Low-Energy Adaptive Clustering Hierarchy), a clustering-based protocol that utilizes randomized rotation of local cluster based station (cluster-heads) to evenly distribute the energy load among the sensors in the network, is proposed.
Proceedings ArticleDOI

A key-management scheme for distributed sensor networks

TL;DR: A key-management scheme designed to satisfy both operational and security requirements of DSNs is presented, which relies on probabilistic key sharing among the nodes of a random graph and uses simple protocols for shared-key discovery and path-key establishment, and for key revocation, re-keying, and incremental addition of nodes.
Proceedings Article

The MD5 Message-Digest Algorithm

TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Related Papers (5)