Journal of Terahertz Science and Electronic Information Technology , Volume. 21, Issue 8, 1049(2023)

Key management method against capture attack in power internet of things based on double-layer grid model

ZHANG Weixin1, LIU Jialin2, and YAN Peng3
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • 3[in Chinese]
  • show less
    References(13)

    [2] [2] FAKHREY,HARITH,JOHNSTON,et al. The optimum design of location-dependent key management protocol for a multiple sink WSN using a random selected cell reporter[J]. IEEE Sensors Journal, 2018,18(24):10163-10173.

    [3] [3] ZHAO J. Topological properties of secure wireless sensor networks under the q-composite key predistribution scheme with unreliable links[J]. IEEE/ACM Transactions on Networking, 2017,25(3):1789-1802.

    [4] [4] WU F,XU L,LI X,et al. A lightweight and provably secure key agreement system for a smart grid with elliptic curve cryptography [J]. IEEE Systems Journal, 2018,64(8):2072-2085.

    [5] [5] BECHKIT W, CHALLAL Y, BOUABDALLAH A, et al. A highly scalable key pre-distribution scheme for Wireless Sensor Networks[J]. IEEE Transactions on Wireless Communications, 2013,12(2):948-959.

    [8] [8] PARK K,PARK Y,DAS A K,et al. A dynamic privacy-preserving key management protocol for V2G in social internet of things [J]. IEEE Access, 2019,7(2):76812-76832.

    [9] [9] ALBAKRI A,HARN L,SONG S. Hierarchical key management scheme with probabilistic security in a Wireless Sensor Network (WSN)[J]. Security and Communication Networks, 2019(4):1-11.

    [10] [10] MAZIN A, DAVASLIOGLU K, GITLIN R D. Secure key management for 5G physical layer security[C]// 2017 IEEE 18th Wireless and Microwave Technology Conference(WAMICON). Cocoa Beach,FL,USA:[s.n.], 2017:1-5.

    [11] [11] HOANG T,BUI V,VU N,et al. A lightweight mixed secure scheme based on the watermarking technique for hierarchy Wireless Sensor Networks[C]// 2020 International Conference on Information Networking(ICOIN). Barcelona,Spain:[s.n.], 2020:649-653.

    [12] [12] WANG C, WANG D, TU Y, et al. Understanding node capture attacks in user authentication schemes for Wireless Sensor Networks[J]. IEEE Transactions on Dependable and Secure Computing, 2020,11(9):1545-1550.

    [13] [13] PUTRA D R,ANGGOROJATI B,PRATAMA A P. Blockchain and smart-contract for scalable access control in internet of things [C]// 2019 International Conference on ICT for Smart Society(ICISS). Bandung,Indonesia:[s.n.], 2019:1-5.

    [14] [14] GEETHA R, MADHUSUDHAN V, PADMAVATHY T, et al. A light weight secure communication scheme for Wireless Sensor Networks[J]. Wireless Personal Communications, 2019,108(2):1957-1976.

    [15] [15] AKHBARIFAR,SAMIRA,JAVADI,et al. Hybrid key pre-distribution scheme based on symmetric design[J]. Iranian Journal of Science and Technology Transaction A-Science, 2019,43(A5):2399-2406.

    [16] [16] CHOI J,BANG J,KIM L H,et al. Location-based key management strong against insider threats in Wireless Sensor Networks[J]. IEEE Systems Journal, 2017,11(99):494-502.

    Tools

    Get Citation

    Copy Citation Text

    ZHANG Weixin, LIU Jialin, YAN Peng. Key management method against capture attack in power internet of things based on double-layer grid model[J]. Journal of Terahertz Science and Electronic Information Technology , 2023, 21(8): 1049

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category:

    Received: Mar. 10, 2021

    Accepted: --

    Published Online: Jan. 17, 2024

    The Author Email:

    DOI:10.11805/tkyda2021104

    Topics