Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Highly Resilient Key Predistribution Scheme Using Transversal Designs and Reed Muller Codes For Wireless Sensor Network

    Resource constraints of the nodes make security protocols difficult to implement. Thus key management is an important area of research in Wireless Sensor Networks (WSN). Key predistribution (kpd) which involve...

    Samiran Bag, Amrita Saha, Pinaki Sarkar in Advances in Network Security and Applications (2011)

  2. No Access

    Chapter and Conference Paper

    100% Connectivity for Location Aware Code Based KPD in Clustered WSN: Merging Blocks

    Key management in wireless sensor networks (WSN) is a challenging task because of the stringent resource available to the nodes. As such key predistribution (KPD) is regarded as one of the best option for key ...

    Samiran Bag, Aritra Dhar, Pinaki Sarkar in Information Security (2012)

  3. Chapter and Conference Paper

    Code Based KPD Scheme with Full Connectivity: Deterministic Merging

    Key PreDistribution (KPD) is one of the standard key management techniques of distributing the symmetric cryptographic keys among the resource constrained nodes of a Wireless Sensor Network (WSN). To optimize ...

    Pinaki Sarkar, Aritra Dhar in Information and Communication Technology (2013)

  4. No Access

    Chapter and Conference Paper

    Inductive Hierarchical Identity Based Key Agreement with Pre-deployment Interactions (i-H-IB-KA-pdi)

    We propose two hierarchical identity based key agreement schemes with unrestricted number of levels. Our solutions use pre-deployment (encrypted) interactions among ancestors using–(i) purely public key crypto...

    Pinaki Sarkar, Morshed Uddin Chowdhury in Applications and Techniques in Information… (2016)

  5. No Access

    Chapter and Conference Paper

    Secure IoT Using Weighted Signed Graphs

    Key management has always remained a challenging problem for the entire security community. Standard practice in modern times is to agree on symmetric keys using public key protocols. However, public key prot...

    Pinaki Sarkar, Morshed Uddin Chowdhury in Security and Privacy in Communication Networks (2017)

  6. No Access

    Chapter and Conference Paper

    Key Predistribution Schemes Using Bent Functions in Distributed Sensor Networks

    Key management is an essential functionality for develo** secure cryptosystems; particularly for implementations to low cost devices of a Distributed Sensor Networks (DSN)–a prototype of Internet of Things (...

    Deepak Kumar Dalai, Pinaki Sarkar in Information Security and Cryptology (2017)

  7. No Access

    Chapter and Conference Paper

    Enhancing Resilience of KPS Using Bidirectional Hash Chains and Application on Sensornet

    Key predistribution schemes (KPS) that establish symmetric secrets are best suited for resource constraint devices of low cost Internet of Things (IoT). Due to the large size of network and the limited memory,...

    Deepak Kumar Dalai, Pinaki Sarkar in Network and System Security (2017)

  8. No Access

    Chapter and Conference Paper

    Lightweight Deterministic Non Interactive (ni) Hierarchical Key Agreement Scheme (KAS)

    Key management is a cornerstone requirement for any security solution. Energy efficient key agreement schemes (KAS) that establish symmetric secrets are best suited for resource constraint devices of low cost ...

    Pinaki Sarkar in Network and System Security (2017)

  9. No Access

    Chapter and Conference Paper

    CRT-KPS: A Key Predistribution Schemes Using CRT

    Key Predistribution Schemes (KPS) are efficient key management solutions that are well suited to establish lightweight symmetric keys even in resource starved environments, like low cost Internet of Things (Io...

    Pinaki Sarkar, Mayank Baranwal, Sukumar Nandi in Information Security and Privacy (2018)