A Privacy-Preserving Key Management Scheme with Support for Sybil Attack Detection in VANETs [PDF]
Vehicular ad hoc networks (VANETs) face two important and conflicting challenges with regards to security: preserve the privacy of vehicles in order to prevent malicious entities from tracking users and detect and remove bad actors that attempt to game ...
L. Ellen Funderburg, Im-Yeong Lee
doaj +2 more sources
A Key Management Scheme Based on Pairing-Free Identity Based Digital Signature Algorithm for Heterogeneous Wireless Sensor Networks [PDF]
The secure transmission of data within a network has received great attention. As the core of the security management mechanism, the key management scheme design needs further research.
Erdong Yuan +4 more
doaj +2 more sources
A Hybrid Key Management Scheme for WSNs Based on PPBR and a Tree-Based Path Key Establishment Method [PDF]
With the development of wireless sensor networks (WSNs), in most application scenarios traditional WSNs with static sink nodes will be gradually replaced by Mobile Sinks (MSs), and the corresponding application requires a secure communication environment.
Ying Zhang +3 more
doaj +2 more sources
Lightweight and dynamic authenticated key agreement and management protocol for smart grid
With the development of IoT and 5G, the smart grid, as one of the key component for the smart city, can provide the uninterrupted and reliable electricity service by properly adjusting the electricity supply according to the consumption of users.
Feng Zhai +4 more
doaj +1 more source
A Secure and Efficient Group Key Management Scheme for Clusters of String Inverters
A string inverter converts the low voltage direct current coming from the string of its Photovoltaic (PV) panels into alternating current to be exported to the grid.
Mariano Basile +3 more
doaj +1 more source
Secure Video Surveillance Framework in Smart City
In the construction process of smart cities, more and more video surveillance systems have been deployed for traffic, office buildings, shopping malls, and families. Thus, the security of video surveillance systems has attracted more attention.
Hao Li +4 more
doaj +1 more source
A Survey on Key Management and Authentication Approaches in Smart Metering Systems
The implementation of the smart grid (SG) and cyber-physical systems (CPS) greatly enhances the safety, reliability, and efficiency of energy production and distribution.
Mohamed S. Abdalzaher +4 more
doaj +1 more source
Research on key management and authentication protocol of PDA in smart grid
According to PDA in smart grid,which faced with security issues,key management and authentication protocol for PDA in smart grid based on scrambling PUF were presented.With the construction of mobile trusted platform by trusted hardware module and PDA,a ...
Xiao YU, Li TIAN, Zhe LIU, Jie WANG
doaj +3 more sources
Security Improve in ZigBee Protocol Based on RSA Public Algorithm in WSN [PDF]
ZigBee is consuming low energy and providing the protection in Wireless Sensor Networks. ZigBee pro is supporting most applications. In spite of improved the security, ZigBee pro weak in key administration. In this paper, we depend on Logistic Map Diffie
Nabaa Hasan, Alaa Farhan
doaj +1 more source
Key management scheme with private key self-healing ability in DTN
Because of the large delay of DTN network,node cannot receive broadcast updating private key messages in a timely manner,thus unable to update the private key for a certain time period.Aiming at this problem,an allowing private key self-healing ...
De-quan LI,Xi-yong ZHANG,Ting-ting ZHANG +1 more
doaj +1 more source

