Journal of Terahertz Science and Electronic Information Technology , Volume. 21, Issue 8, 1049(2023)
Key management method against capture attack in power internet of things based on double-layer grid model
[2] [2] FAKHREY,HARITH,JOHNSTON,et al. The optimum design of location-dependent key management protocol for a multiple sink WSN using a random selected cell reporter[J]. IEEE Sensors Journal, 2018,18(24):10163-10173.
[3] [3] ZHAO J. Topological properties of secure wireless sensor networks under the q-composite key predistribution scheme with unreliable links[J]. IEEE/ACM Transactions on Networking, 2017,25(3):1789-1802.
[4] [4] WU F,XU L,LI X,et al. A lightweight and provably secure key agreement system for a smart grid with elliptic curve cryptography [J]. IEEE Systems Journal, 2018,64(8):2072-2085.
[5] [5] BECHKIT W, CHALLAL Y, BOUABDALLAH A, et al. A highly scalable key pre-distribution scheme for Wireless Sensor Networks[J]. IEEE Transactions on Wireless Communications, 2013,12(2):948-959.
[8] [8] PARK K,PARK Y,DAS A K,et al. A dynamic privacy-preserving key management protocol for V2G in social internet of things [J]. IEEE Access, 2019,7(2):76812-76832.
[9] [9] ALBAKRI A,HARN L,SONG S. Hierarchical key management scheme with probabilistic security in a Wireless Sensor Network (WSN)[J]. Security and Communication Networks, 2019(4):1-11.
[10] [10] MAZIN A, DAVASLIOGLU K, GITLIN R D. Secure key management for 5G physical layer security[C]// 2017 IEEE 18th Wireless and Microwave Technology Conference(WAMICON). Cocoa Beach,FL,USA:[s.n.], 2017:1-5.
[11] [11] HOANG T,BUI V,VU N,et al. A lightweight mixed secure scheme based on the watermarking technique for hierarchy Wireless Sensor Networks[C]// 2020 International Conference on Information Networking(ICOIN). Barcelona,Spain:[s.n.], 2020:649-653.
[12] [12] WANG C, WANG D, TU Y, et al. Understanding node capture attacks in user authentication schemes for Wireless Sensor Networks[J]. IEEE Transactions on Dependable and Secure Computing, 2020,11(9):1545-1550.
[13] [13] PUTRA D R,ANGGOROJATI B,PRATAMA A P. Blockchain and smart-contract for scalable access control in internet of things [C]// 2019 International Conference on ICT for Smart Society(ICISS). Bandung,Indonesia:[s.n.], 2019:1-5.
[14] [14] GEETHA R, MADHUSUDHAN V, PADMAVATHY T, et al. A light weight secure communication scheme for Wireless Sensor Networks[J]. Wireless Personal Communications, 2019,108(2):1957-1976.
[15] [15] AKHBARIFAR,SAMIRA,JAVADI,et al. Hybrid key pre-distribution scheme based on symmetric design[J]. Iranian Journal of Science and Technology Transaction A-Science, 2019,43(A5):2399-2406.
[16] [16] CHOI J,BANG J,KIM L H,et al. Location-based key management strong against insider threats in Wireless Sensor Networks[J]. IEEE Systems Journal, 2017,11(99):494-502.
Get Citation
Copy Citation Text
ZHANG Weixin, LIU Jialin, YAN Peng. Key management method against capture attack in power internet of things based on double-layer grid model[J]. Journal of Terahertz Science and Electronic Information Technology , 2023, 21(8): 1049
Category:
Received: Mar. 10, 2021
Accepted: --
Published Online: Jan. 17, 2024
The Author Email: