Smart City Gnosys

Smart city article details

Title New Key Management Scheme Based On Pool-Hash For Wsn And Iot
ID_Doc 39136
Authors Msolli A.; Ajmi N.; Helali A.; Gassoumi A.; Maaref H.; Mghaieth R.
Year 2023
Published Journal of Information Security and Applications, 73
DOI http://dx.doi.org/10.1016/j.jisa.2022.103415
Abstract The Internet of Things (IoT) brings together the applications linking many devices to the Internet to make the environment more “smart”. Uses vary from the human scale, from housing (Smart Home) to that of the city (Smart Cities), transport and industry. Wireless sensor networks (WSNs), which are a sub-part of the IoT, have attracted a lot of interest over lasts years in security to ensure the integrity, the authenticity and the data confidentiality. Due to the deployment of nodes in remote areas, the solution brought to the wireless sensor network to increase the information security consists to protect the messages exchanged between nodes. In the paper, we propose a new key management protocol called the Key management scheme based on pool-hash, for the establishment of new key types. We present the modification of the proposed scheme to that of the basic scheme by detailing the different phases of key management. Modification exposes a new key pool contains original keys and other hashed admit the same identities thus new session keys transmitted between sensors nodes are defined during the discovery and path key phases. Then, we specify and formalize this protocol using a mathematical concept to model the probability of connectivity and resilience against node capture. The experimental results prove that the proposed scheme is adapted to the WSN applications in terms of connectivity and resiliency. © 2022
Author Keywords Connectivity; Establishment key; IoT; Key management; Resilience; Secure link; Wireless sensors network


Similar Articles


Id Similarity Authors Title Published
8038 View0.885Singh S.; Singh A.An Enhanced Authenticated Key Agreement Scheme For Cloud-Based Iot In Wireless Sensor NetworksInternational Journal of Electrical and Electronics Research, 11, 4 (2023)
2150 View0.867Alatawi M.N.A Hybrid Cryptographic Cipher Solution For Secure Communication In Smart CitiesInternational Journal of Computer Networks and Applications, 10, 5 (2023)
47557 View0.861Meena U.; Sharma P.Secret Dynamic Key Authentication And Decision Trust Secure Routing Framework For Internet Of Things Based WsnWireless Personal Communications, 125, 2 (2022)
46540 View0.861Srinivas K.; Sagar K.Review: Secure Key Management Techniques In Iot-Enabled Wireless Sensor NetworksAIP Conference Proceedings, 2971, 1 (2024)
17349 View0.858Mary S.S.C.; Shri S.J.; Thenmozhi E.; Murugeswari K.Data Security In Wireless Sensor Networks Using An Efficient Cryptographic Technique To Protect Against IntrusionSSRG International Journal of Electronics and Communication Engineering, 10, 4 (2023)
35256 View0.852Rana M.; Mamun Q.; Islam R.Lightweight Cryptography In Iot Networks: A SurveyFuture Generation Computer Systems, 129 (2022)