![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
CRT-KPS: A Key Predistribution Schemes Using CRT
Key Predistribution Schemes (KPS) are efficient key management solutions that are well suited to establish lightweight symmetric keys even in resource starved environments, like low cost Internet of Things (Io...
-
Chapter and Conference Paper
Secure IoT Using Weighted Signed Graphs
Key management has always remained a challenging problem for the entire security community. Standard practice in modern times is to agree on symmetric keys using public key protocols. However, public key prot...
-
Chapter and Conference Paper
Key Predistribution Schemes Using Bent Functions in Distributed Sensor Networks
Key management is an essential functionality for develo** secure cryptosystems; particularly for implementations to low cost devices of a Distributed Sensor Networks (DSN)–a prototype of Internet of Things (...
-
Chapter and Conference Paper
Enhancing Resilience of KPS Using Bidirectional Hash Chains and Application on Sensornet
Key predistribution schemes (KPS) that establish symmetric secrets are best suited for resource constraint devices of low cost Internet of Things (IoT). Due to the large size of network and the limited memory,...
-
Chapter and Conference Paper
Lightweight Deterministic Non Interactive (ni) Hierarchical Key Agreement Scheme (KAS)
Key management is a cornerstone requirement for any security solution. Energy efficient key agreement schemes (KAS) that establish symmetric secrets are best suited for resource constraint devices of low cost ...
-
Chapter and Conference Paper
Inductive Hierarchical Identity Based Key Agreement with Pre-deployment Interactions (i-H-IB-KA-pdi)
We propose two hierarchical identity based key agreement schemes with unrestricted number of levels. Our solutions use pre-deployment (encrypted) interactions among ancestors using–(i) purely public key crypto...
-
Chapter and Conference Paper
Code Based KPD Scheme with Full Connectivity: Deterministic Merging
Key PreDistribution (KPD) is one of the standard key management techniques of distributing the symmetric cryptographic keys among the resource constrained nodes of a Wireless Sensor Network (WSN). To optimize ...
-
Chapter and Conference Paper
100% Connectivity for Location Aware Code Based KPD in Clustered WSN: Merging Blocks
Key management in wireless sensor networks (WSN) is a challenging task because of the stringent resource available to the nodes. As such key predistribution (KPD) is regarded as one of the best option for key ...
-
Chapter and Conference Paper
Highly Resilient Key Predistribution Scheme Using Transversal Designs and Reed Muller Codes For Wireless Sensor Network
Resource constraints of the nodes make security protocols difficult to implement. Thus key management is an important area of research in Wireless Sensor Networks (WSN). Key predistribution (kpd) which involve...