Otwarty dostęp

Exploring Cryptographic Key Management Schemes for Enhanced Security in WSNs

  
28 lut 2025

Zacytuj
Pobierz okładkę

Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393–422. AkyildizI. F. SuW. SankarasubramaniamY. CayirciE. 2002 Wireless sensor networks: A survey Computer Networks 38 4 393 422 Search in Google Scholar

Othman, M. F., & Shazali, K. (2012). Wireless sensor network applications: A study in the environment monitoring system. Procedia Engineering, 41, 1204–1210. OthmanM. F. ShazaliK. 2012 Wireless sensor network applications: A study in the environment monitoring system Procedia Engineering 41 1204 1210 Search in Google Scholar

Mohamed, N., Al-Jaroodi, J., Jawhar, I., Idries, A., & Mohammed, F. (2020). Unmanned aerial vehicles applications in future smart cities. Technological forecasting and social change, 153, 119293. MohamedN. Al-JaroodiJ. JawharI. IdriesA. MohammedF. 2020 Unmanned aerial vehicles applications in future smart cities Technological forecasting and social change 153 119293 Search in Google Scholar

Islam, K., Shen, W., & Wang, X. (2012). Wireless sensor network reliability and security in factory automation: A survey. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 42(6), 1243–1256. IslamK. ShenW. WangX. 2012 Wireless sensor network reliability and security in factory automation: A survey IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 42 6 1243 1256 Search in Google Scholar

Jain, K., Kumar, A., & Singh, A. (2023). Data transmission reduction techniques for improving network lifetime in wireless sensor networks: An up-to-date survey from 2017 to 2022. Transactions on Emerging Telecommunications Technologies, 34(1), e4674. JainK. KumarA. SinghA. 2023 Data transmission reduction techniques for improving network lifetime in wireless sensor networks: An up-to-date survey from 2017 to 2022 Transactions on Emerging Telecommunications Technologies 34 1 e4674 Search in Google Scholar

Jain, K., & Kumar, A. (2021). A lightweight data transmission reduction method based on a dual prediction technique for sensor networks. Transactions on Emerging Telecommunications Technologies, 32(11), e4345. JainK. KumarA. 2021 A lightweight data transmission reduction method based on a dual prediction technique for sensor networks Transactions on Emerging Telecommunications Technologies 32 11 e4345 Search in Google Scholar

Granjal, J., Monteiro, E., & Silva, J. S. (2015). Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey. Ad Hoc Networks, 24, 264–287. GranjalJ. MonteiroE. SilvaJ. S. 2015 Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey Ad Hoc Networks 24 264 287 Search in Google Scholar

He, Y., Zhou, Z., Pan, Y., Chong, F., Wu, B., Xiao, K., & Li, H. (2024). Review of data security within energy blockchain: A comprehensive analysis of storage, management, and utilization. High-Confidence Computing, 100233. HeY. ZhouZ. PanY. ChongF. WuB. XiaoK. LiH. 2024 Review of data security within energy blockchain: A comprehensive analysis of storage, management, and utilization High-Confidence Computing 100233 Search in Google Scholar

Singh, A., & Jain, K. (2022). An efficient secure key establishment method in cluster-based sensor network. Telecommunication Systems, 79(1), 3–16. SinghA. JainK. 2022 An efficient secure key establishment method in cluster-based sensor network Telecommunication Systems 79 1 3 16 Search in Google Scholar

Gautam, A. K., & Kumar, R. (2021). A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks. SN Applied Sciences, 3(1), 50. GautamA. K. KumarR. 2021 A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks SN Applied Sciences 3 1 50 Search in Google Scholar

Singh, P., Acharya, B., & Chaurasiya, R. K. (2021). Lightweight cryptographic algorithms for resource-constrained IoT devices and sensor networks. In Security and Privacy Issues in IoT Devices and Sensor Networks (pp. 153–185). Academic Press. SinghP. AcharyaB. ChaurasiyaR. K. 2021 Lightweight cryptographic algorithms for resource-constrained IoT devices and sensor networks In Security and Privacy Issues in IoT Devices and Sensor Networks 153 185 Academic Press Search in Google Scholar

Singh, S., Sharma, P. K., Moon, S. Y., & Park, J. H. (2024). Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. Journal of Ambient Intelligence and Humanized Computing, 1–18. SinghS. SharmaP. K. MoonS. Y. ParkJ. H. 2024 Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions Journal of Ambient Intelligence and Humanized Computing 1 18 Search in Google Scholar

Khan, M. N., Rao, A., & Camtepe, S. (2020). Lightweight cryptographic protocols for IoT-constrained devices: A survey. IEEE Internet of Things Journal, 8(6), 4132–4156. KhanM. N. RaoA. CamtepeS. 2020 Lightweight cryptographic protocols for IoT-constrained devices: A survey IEEE Internet of Things Journal 8 6 4132 4156 Search in Google Scholar

Pandey, S., & Bhushan, B. (2024). Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks. Wireless Networks, 30(4), 2987–3026. PandeyS. BhushanB. 2024 Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks Wireless Networks 30 4 2987 3026 Search in Google Scholar

Iqbal, S., & Sujatha, B. R. (2024). Secure authentication and key management based on hierarchical enhanced identity based digital signature in heterogeneous wireless sensor network. Wireless Networks, 1–21. IqbalS. SujathaB. R. 2024 Secure authentication and key management based on hierarchical enhanced identity based digital signature in heterogeneous wireless sensor network Wireless Networks 1 21 Search in Google Scholar

Gopalakrishnan, K. (2020). Security vulnerabilities and issues of traditional wireless sensors networks in IoT. Principles of internet of things (IoT) ecosystem: Insight paradigm, 519–549. GopalakrishnanK. 2020 Security vulnerabilities and issues of traditional wireless sensors networks in IoT Principles of internet of things (IoT) ecosystem: Insight paradigm 519 549 Search in Google Scholar

Oztoprak, A., Hassanpour, R., Ozkan, A., & Oztoprak, K. (2024). Security Challenges, Mitigation Strategies, and Future Trends in Wireless Sensor Networks: A Review. ACM Computing Surveys. OztoprakA. HassanpourR. OzkanA. OztoprakK. 2024 Security Challenges, Mitigation Strategies, and Future Trends in Wireless Sensor Networks: A Review ACM Computing Surveys Search in Google Scholar

Kampourakis, V., Gkioulos, V., & Katsikas, S. (2023). A systematic literature review on wireless security testbeds in the cyber-physical realm. Computers & Security, 103383. KampourakisV. GkioulosV. KatsikasS. 2023 A systematic literature review on wireless security testbeds in the cyber-physical realm Computers & Security 103383 Search in Google Scholar

Saeed, M. M., Ali, E. S., & Saeed, R. A. (2023). Data-driven techniques and security issues in wireless networks. In Data-Driven Intelligence in Wireless Networks (pp. 107–154). CRC Press. SaeedM. M. AliE. S. SaeedR. A. 2023 Data-driven techniques and security issues in wireless networks In Data-Driven Intelligence in Wireless Networks 107 154 CRC Press Search in Google Scholar

Alghamdi, A., Al Shahrani, A. M., AlYami, S. S., Khan, I. R., Sri, P. A., Dutta, P., ... & Venkatareddy, P. (2024). Security and energy efficient cyber-physical systems using predictive modeling approaches in wireless sensor network. Wireless Networks, 30(6), 5851–5866. AlghamdiA. Al ShahraniA. M. AlYamiS. S. KhanI. R. SriP. A. DuttaP. VenkatareddyP. 2024 Security and energy efficient cyber-physical systems using predictive modeling approaches in wireless sensor network Wireless Networks 30 6 5851 5866 Search in Google Scholar

Jain, K., & Kumar, A. (2020). Energy-efficient data-aggregation technique for correlated spatial and temporal data in cluster-based sensor networks. International Journal of Business Data Communications and Networking (IJBDCN), 16(2), 53–68. JainK. KumarA. 2020 Energy-efficient data-aggregation technique for correlated spatial and temporal data in cluster-based sensor networks International Journal of Business Data Communications and Networking (IJBDCN) 16 2 53 68 Search in Google Scholar

Agarwal, A., Dev, A., & Jain, K. (2020). Prolonging sensor network lifetime by using energy-efficient cluster-based scheduling. Int J Sci Technol Res, 9(4), 3410–3415. AgarwalA. DevA. JainK. 2020 Prolonging sensor network lifetime by using energy-efficient cluster-based scheduling Int J Sci Technol Res 9 4 3410 3415 Search in Google Scholar

L. Eschenauer and V. D. Gligor, “A key-management scheme for distributed sensor networks”, Proc. ACM Conf. Comput. Commun. Securit, pp. 41–47, 2002-Nov. EschenauerL. GligorV. D. “A key-management scheme for distributed sensor networks” Proc. ACM Conf. Comput. Commun. Securit 41 47 2002-Nov Search in Google Scholar

Albrecht, M., Gentry, C., Halevi, S., & Katz, J. (2009, November). Attacking cryptographic schemes based on “perturbation polynomials”. In Proceedings of the 16th ACM conference on Computer and communications security (pp. 1–10). AlbrechtM. GentryC. HaleviS. KatzJ. 2009, November Attacking cryptographic schemes based on “perturbation polynomials” In Proceedings of the 16th ACM conference on Computer and communications security 1 10 Search in Google Scholar

Saha, R., Geetha, G., Kumar, G., & Kim, T. H. (2018). RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys. Security and Communication Networks, 2018(1), 9802475. SahaR. GeethaG. KumarG. KimT. H. 2018 RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys Security and Communication Networks 2018 1 9802475 Search in Google Scholar

Masaeli, N., Javadi, H. H. S., & Erfani, S. H. (2020). Key pre-distribution scheme based on transversal design in large mobile fog networks with multi-clouds. Journal of Information Security and Applications, 54, 102519. MasaeliN. JavadiH. H. S. ErfaniS. H. 2020 Key pre-distribution scheme based on transversal design in large mobile fog networks with multi-clouds Journal of Information Security and Applications 54 102519 Search in Google Scholar

Kandi, M. A., Kouicem, D. E., Doudou, M., Lakhlef, H., Bouabdallah, A., & Challal, Y. (2022). A decentralized blockchain-based key management protocol for heterogeneous and dynamic IoT devices. Computer Communications, 191, 11–25. KandiM. A. KouicemD. E. DoudouM. LakhlefH. BouabdallahA. ChallalY. 2022 A decentralized blockchain-based key management protocol for heterogeneous and dynamic IoT devices Computer Communications 191 11 25 Search in Google Scholar

Verma, R. M., & Basile, B. E. (2013, June). Modeling and analysis of LEAP, a key management protocol for wireless sensor networks. In 2013 IEEE International Workshop on Security and Privacy of Mobile, Wireless, and Sensor Networks (MWSN) (pp. 23–25). IEEE. VermaR. M. BasileB. E. 2013, June Modeling and analysis of LEAP, a key management protocol for wireless sensor networks In 2013 IEEE International Workshop on Security and Privacy of Mobile, Wireless, and Sensor Networks (MWSN) 23 25 IEEE Search in Google Scholar

Yu, X., Fang, J., & Zhang, Z. (2013). A Security Mechanism Based on Authenticated Diffie-Hellman for WSN. TELKOMNIKA Indonesian Journal of Electrical Engineering, 11(6), 3349–3354. YuX. FangJ. ZhangZ. 2013 A Security Mechanism Based on Authenticated Diffie-Hellman for WSN TELKOMNIKA Indonesian Journal of Electrical Engineering 11 6 3349 3354 Search in Google Scholar

Mehra, P. S., Doja, M. N., & Alam, B. (2019). Codeword Authenticated Key Exchange (CAKE) light weight secure routing protocol for WSN. International Journal of Communication Systems, 32(3), e3879. MehraP. S. DojaM. N. AlamB. 2019 Codeword Authenticated Key Exchange (CAKE) light weight secure routing protocol for WSN International Journal of Communication Systems 32 3 e3879 Search in Google Scholar

Chen, C. M., Deng, X., Gan, W., Chen, J., & Islam, S. H. (2021). A secure blockchain-based group key agreement protocol for IoT. The Journal of Supercomputing, 77, 9046–9068. ChenC. M. DengX. GanW. ChenJ. IslamS. H. 2021 A secure blockchain-based group key agreement protocol for IoT The Journal of Supercomputing 77 9046 9068 Search in Google Scholar

Singh, A., & Jain, K. (2022). An automated lightweight key establishment method for secure communication in WSN. Wireless Personal Communications, 124(4), 2831–2851. SinghA. JainK. 2022 An automated lightweight key establishment method for secure communication in WSN Wireless Personal Communications 124 4 2831 2851 Search in Google Scholar

Msolli, A., Ajmi, N., Helali, A., Gassoumi, A., Maaref, H., & Mghaieth, R. (2023). New key management scheme based on pool-hash for WSN and IoT. Journal of Information Security and Applications, 73, 103415. MsolliA. AjmiN. HelaliA. GassoumiA. MaarefH. MghaiethR. 2023 New key management scheme based on pool-hash for WSN and IoT Journal of Information Security and Applications 73 103415 Search in Google Scholar

Jain, K., & Singh, A. (2024). IHKM: an improved hierarchical key management scheme for wireless sensor network. Telecommunication Systems, 1–16. JainK. SinghA. 2024 IHKM: an improved hierarchical key management scheme for wireless sensor network Telecommunication Systems 1 16 Search in Google Scholar

Di Pietro, R., Mancini, L. V., & Mei, A. (2010). Hierarchies of keys in secure multicast communications. Journal of Computer Security, 18(5), 839–860. Di PietroR. ManciniL. V. MeiA. 2010 Hierarchies of keys in secure multicast communications Journal of Computer Security 18 5 839 860 Search in Google Scholar

Doraipandian, M., & Neelamegam, P. (2015). An Efficient Key Management Scheme in Multi-Tier and Multi-Cluster Wireless Sensor Networks. Int. J. Netw. Secur., 17(6), 651–660. DoraipandianM. NeelamegamP. 2015 An Efficient Key Management Scheme in Multi-Tier and Multi-Cluster Wireless Sensor Networks Int. J. Netw. Secur. 17 6 651 660 Search in Google Scholar

Li, Z., Wang, H., & Fang, H. (2017). Group-based cooperation on symmetric key generation for wireless body area networks. IEEE Internet of Things Journal, 4(6), 1955–1963. LiZ. WangH. FangH. 2017 Group-based cooperation on symmetric key generation for wireless body area networks IEEE Internet of Things Journal 4 6 1955 1963 Search in Google Scholar

Amutha, J., Sharma, S., & Sharma, S. K. (2022). An energy efficient cluster based hybrid optimization algorithm with static sink and mobile sink node for Wireless Sensor Networks. Expert Systems with Applications, 203, 117334. AmuthaJ. SharmaS. SharmaS. K. 2022 An energy efficient cluster based hybrid optimization algorithm with static sink and mobile sink node for Wireless Sensor Networks Expert Systems with Applications 203 117334 Search in Google Scholar

Ruj, S., Nayak, A., & Stojmenovic, I. (2012). Pairwise and triple key distribution in wireless sensor networks with applications. IEEE Transactions on Computers, 62(11), 2224–2237. RujS. NayakA. StojmenovicI. 2012 Pairwise and triple key distribution in wireless sensor networks with applications IEEE Transactions on Computers 62 11 2224 2237 Search in Google Scholar

Baburaj, E. (2017). Polynomial and multivariate mapping-based triple-key approach for secure key distribution in wireless sensor networks. Computers & Electrical Engineering, 59, 274–290. BaburajE. 2017 Polynomial and multivariate mapping-based triple-key approach for secure key distribution in wireless sensor networks Computers & Electrical Engineering 59 274 290 Search in Google Scholar

Das, A. K., Wazid, M., Yannam, A. R., Rodrigues, J. J., & Park, Y. (2019). Provably secure ECC-based device access control and key agreement protocol for IoT environment. IEEE Access, 7, 55382–55397. DasA. K. WazidM. YannamA. R. RodriguesJ. J. ParkY. 2019 Provably secure ECC-based device access control and key agreement protocol for IoT environment IEEE Access 7 55382 55397 Search in Google Scholar

Yu, B., & Li, H. (2019). Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things. International Journal of Distributed Sensor Networks, 15(9), 1550147719879379. YuB. LiH. 2019 Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things International Journal of Distributed Sensor Networks 15 9 1550147719879379 Search in Google Scholar

Zhao, G., Yang, X., Zhou, B., & Wei, W. (2010, July). RSA-based digital image encryption algorithm in wireless sensor networks. In 2010 2nd International conference on signal processing systems (Vol. 2, pp. V2-640). IEEE. ZhaoG. YangX. ZhouB. WeiW. 2010, July RSA-based digital image encryption algorithm in wireless sensor networks In 2010 2nd International conference on signal processing systems 2 V2 640 IEEE Search in Google Scholar

Chatterjee, S., & Das, A. K. (2015). An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks. Security and Communication Networks, 8(9), 1752–1771. ChatterjeeS. DasA. K. 2015 An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks Security and Communication Networks 8 9 1752 1771 Search in Google Scholar

Ali, I., Hassan, A., & Li, F. (2019). Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey. Vehicular Communications, 16, 45–61. AliI. HassanA. LiF. 2019 Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey Vehicular Communications 16 45 61 Search in Google Scholar

Dhanda, S. S., Singh, B., & Jindal, P. (2020). Lightweight cryptography: a solution to secure IoT. Wireless Personal Communications, 112(3), 1947–1980. DhandaS. S. SinghB. JindalP. 2020 Lightweight cryptography: a solution to secure IoT Wireless Personal Communications 112 3 1947 1980 Search in Google Scholar

Twardokus, G., Bindel, N., Rahbari, H., & McCarthy, S. (2022). When cryptography needs a hand: Practical post-quantum authentication for V2V communications. Cryptology ePrint Archive. TwardokusG. BindelN. RahbariH. McCarthyS. 2022 When cryptography needs a hand: Practical post-quantum authentication for V2V communications Cryptology ePrint Archive Search in Google Scholar

Ganeshan, A., Jayagopalan, S., Perumal, B., & Sarveshwaran, V. (2023). Secure identity key and blockchain-based authentication approach for secure data communication in multi-WSN. Concurrency and Computation: Practice and Experience, 35(28), e7861. GaneshanA. JayagopalanS. PerumalB. SarveshwaranV. 2023 Secure identity key and blockchain-based authentication approach for secure data communication in multi-WSN Concurrency and Computation: Practice and Experience 35 28 e7861 Search in Google Scholar

Almuseelem, W. (2023). Energy-efficient and security-aware task offloading for multi-tier edge-cloud computing systems. IEEE Access. AlmuseelemW. 2023 Energy-efficient and security-aware task offloading for multi-tier edge-cloud computing systems IEEE Access Search in Google Scholar

Aydeger, A., Zeydan, E., Yadav, A. K., Hemachandra, K. T., & Liyanage, M. (2024, October). Towards a quantum-resilient future: Strategies for transitioning to post-quantum cryptography. In 2024 15th International Conference on Network of the Future (NoF) (pp. 195–203). IEEE. AydegerA. ZeydanE. YadavA. K. HemachandraK. T. LiyanageM. 2024, October Towards a quantum-resilient future: Strategies for transitioning to post-quantum cryptography In 2024 15th International Conference on Network of the Future (NoF) 195 203 IEEE Search in Google Scholar

Ahlawat, P., & Dave, M. (2018). A cost-effective attack matrix based key management scheme with dominance key set for wireless sensor network security. International Journal of Communication Systems, 31(12), e3713. AhlawatP. DaveM. 2018 A cost-effective attack matrix based key management scheme with dominance key set for wireless sensor network security International Journal of Communication Systems 31 12 e3713 Search in Google Scholar

Dinker, A. G., & Sharma, V. (2019). Polynomial and matrix based key management security scheme in wireless sensor networks. Journal of Discrete Mathematical Sciences and Cryptography, 22(8), 1563–1575. DinkerA. G. SharmaV. 2019 Polynomial and matrix based key management security scheme in wireless sensor networks Journal of Discrete Mathematical Sciences and Cryptography 22 8 1563 1575 Search in Google Scholar

Roy, K. S., Deb, S., & Kalita, H. K. (2024). A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks. Digital Communications and Networks, 10(4), 989–1000. RoyK. S. DebS. KalitaH. K. 2024 A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks Digital Communications and Networks 10 4 989 1000 Search in Google Scholar

Kumar, V., Malik, N., Dhiman, G., & Lohani, T. K. (2021). Scalable and storage efficient dynamic key management scheme for wireless sensor network. Wireless Communications and Mobile Computing, 2021(1), 5512879. KumarV. MalikN. DhimanG. LohaniT. K. 2021 Scalable and storage efficient dynamic key management scheme for wireless sensor network Wireless Communications and Mobile Computing 2021 1 5512879 Search in Google Scholar

Xu, C., & Liu, W. (2014). Key updating methods for combinatorial design based key management schemes. Journal of Sensors, 2014(1), 134357. XuC. LiuW. 2014 Key updating methods for combinatorial design based key management schemes Journal of Sensors 2014 1 134357 Search in Google Scholar

Kumar, A., & Pais, A. R. (2019). A new combinatorial design based key pre-distribution scheme for wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing, 10, 2401–2416. KumarA. PaisA. R. 2019 A new combinatorial design based key pre-distribution scheme for wireless sensor networks Journal of Ambient Intelligence and Humanized Computing 10 2401 2416 Search in Google Scholar

Solari Esfehani, N., & Haj Seyyed Javadi, H. (2021). A survey of key pre-distribution schemes based on combinatorial designs for resource-constrained devices in the IoT network. Wireless Networks, 27(4), 3025–3052. Solari EsfehaniN. Haj Seyyed JavadiH. 2021 A survey of key pre-distribution schemes based on combinatorial designs for resource-constrained devices in the IoT network Wireless Networks 27 4 3025 3052 Search in Google Scholar

Mahamat, M., Jaber, G., & Bouabdallah, A. (2023). Achieving efficient energy-aware security in IoT networks: a survey of recent solutions and research challenges. Wireless Networks, 29(2), 787–808. MahamatM. JaberG. BouabdallahA. 2023 Achieving efficient energy-aware security in IoT networks: a survey of recent solutions and research challenges Wireless Networks 29 2 787 808 Search in Google Scholar

Poornima, M. R., Vimala, H. S., & Shreyas, J. (2023). Holistic survey on energy aware routing techniques for IoT applications. Journal of Network and Computer Applications, 213, 103584. PoornimaM. R. VimalaH. S. ShreyasJ. 2023 Holistic survey on energy aware routing techniques for IoT applications Journal of Network and Computer Applications 213 103584 Search in Google Scholar

Jain, K., Agarwal, A., & Abraham, A. (2022). A combinational data prediction model for data transmission reduction in wireless sensor networks. IEEE Access, 10, 53468–53480. JainK. AgarwalA. AbrahamA. 2022 A combinational data prediction model for data transmission reduction in wireless sensor networks IEEE Access 10 53468 53480 Search in Google Scholar

Rao, P. M., & Deebak, B. D. (2023). A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions. Ad Hoc Networks, 146, 103159. RaoP. M. DeebakB. D. 2023 A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions Ad Hoc Networks 146 103159 Search in Google Scholar

Sen, J. (2023). A survey of cryptography and key management schemes for wireless sensor networks. In Wireless Sensor Networks-Design, Applications and Challenges. IntechOpen. SenJ. 2023 A survey of cryptography and key management schemes for wireless sensor networks In Wireless Sensor Networks-Design, Applications and Challenges IntechOpen Search in Google Scholar

Gupta, M., & Jain, K. (2024). A Comprehensive Survey of Aerial Mesh Networks (AMN): Characteristics, Application, Open Issues, Challenges, and Research Directions. Wireless Personal Communications, 138(1), 333–368. GuptaM. JainK. 2024 A Comprehensive Survey of Aerial Mesh Networks (AMN): Characteristics, Application, Open Issues, Challenges, and Research Directions Wireless Personal Communications 138 1 333 368 Search in Google Scholar

Fathalla, E., & Azab, M. (2024). Beyond Classical Cryptography: A Systematic Review of Post-Quantum Hash-Based Signature Schemes, Security, and Optimizations. IEEE Access. FathallaE. AzabM. 2024 Beyond Classical Cryptography: A Systematic Review of Post-Quantum Hash-Based Signature Schemes, Security, and Optimizations IEEE Access Search in Google Scholar

Shim, K. A. (2021). A survey on post-quantum public-key signature schemes for secure vehicular communications. IEEE Transactions on Intelligent Transportation Systems, 23(9), 14025–14042. ShimK. A. 2021 A survey on post-quantum public-key signature schemes for secure vehicular communications IEEE Transactions on Intelligent Transportation Systems 23 9 14025 14042 Search in Google Scholar

Surla, G., & Lakshmi, R. (2023). Design and evaluation of novel hybrid quantum resistant cryptographic system for enhancing security in wireless body sensor networks. Optical and Quantum Electronics, 55(14), 1252. SurlaG. LakshmiR. 2023 Design and evaluation of novel hybrid quantum resistant cryptographic system for enhancing security in wireless body sensor networks Optical and Quantum Electronics 55 14 1252 Search in Google Scholar

Al-Mekhlafi, Z. G., Al-Janabi, H. D. K., Khalil, A., Al-Shareeda, M. A., Mohammed, B. A., Alsadhan, A. A., ... & Almekhlafi, K. (2024). Lattice-Based Cryptography and Fog Computing Based Efficient Anonymous Authentication Scheme for 5G-Assisted Vehicular Communications. IEEE Access. Al-MekhlafiZ. G. Al-JanabiH. D. K. KhalilA. Al-ShareedaM. A. MohammedB. A. AlsadhanA. A. AlmekhlafiK. 2024 Lattice-Based Cryptography and Fog Computing Based Efficient Anonymous Authentication Scheme for 5G-Assisted Vehicular Communications IEEE Access Search in Google Scholar

Sharma, P., & BR, P. (2024). A lightweight group key management scheme with constant rekeying cost and public bulletin size. Information Security Journal: A Global Perspective, 33(2), 97–120. SharmaP. BRP. 2024 A lightweight group key management scheme with constant rekeying cost and public bulletin size Information Security Journal: A Global Perspective 33 2 97 120 Search in Google Scholar

Logeshwaran, J., Shanmugasundaram, R. N., & Lloret, J. (2024). Load based dynamic channel allocation model to enhance the performance of device-to-device communication in WPAN. Wireless Networks, 1–33. LogeshwaranJ. ShanmugasundaramR. N. LloretJ. 2024 Load based dynamic channel allocation model to enhance the performance of device-to-device communication in WPAN Wireless Networks 1 33 Search in Google Scholar

Sapra, V., Sapra, L., Bhardwaj, A., Almogren, A., Bharany, S., Ur Rehman, A., & Ouahada, K. (2024). Diabetic Retinopathy Detection Using Deep Learning with Optimized Feature Selection. Traitement du Signal, 41(2). SapraV. SapraL. BhardwajA. AlmogrenA. BharanyS. Ur RehmanA. OuahadaK. 2024 Diabetic Retinopathy Detection Using Deep Learning with Optimized Feature Selection Traitement du Signal 41 2 Search in Google Scholar

Khashan, O. A., Khafajah, N. M., Alomoush, W., Alshinwan, M., & Alomari, E. (2024). Smart energy-efficient encryption for wireless multimedia sensor networks using deep learning. IEEE Open Journal of the Communications Society. KhashanO. A. KhafajahN. M. AlomoushW. AlshinwanM. AlomariE. 2024 Smart energy-efficient encryption for wireless multimedia sensor networks using deep learning IEEE Open Journal of the Communications Society Search in Google Scholar

Logeshwaran, J., Shanmugasundaram, R. N., & Lloret, J. (2024). Load based dynamic channel allocation model to enhance the performance of device-to-device communication in WPAN. Wireless Networks, 1–33. LogeshwaranJ. ShanmugasundaramR. N. LloretJ. 2024 Load based dynamic channel allocation model to enhance the performance of device-to-device communication in WPAN Wireless Networks 1 33 Search in Google Scholar

Język:
Angielski