References
- Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393–422.
- Othman, M. F., & Shazali, K. (2012). Wireless sensor network applications: A study in the environment monitoring system. Procedia Engineering, 41, 1204–1210.
- Mohamed, N., Al-Jaroodi, J., Jawhar, I., Idries, A., & Mohammed, F. (2020). Unmanned aerial vehicles applications in future smart cities. Technological forecasting and social change, 153, 119293.
- Islam, K., Shen, W., & Wang, X. (2012). Wireless sensor network reliability and security in factory automation: A survey. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 42(6), 1243–1256.
- Jain, K., Kumar, A., & Singh, A. (2023). Data transmission reduction techniques for improving network lifetime in wireless sensor networks: An up-to-date survey from 2017 to 2022. Transactions on Emerging Telecommunications Technologies, 34(1), e4674.
- Jain, K., & Kumar, A. (2021). A lightweight data transmission reduction method based on a dual prediction technique for sensor networks. Transactions on Emerging Telecommunications Technologies, 32(11), e4345.
- Granjal, J., Monteiro, E., & Silva, J. S. (2015). Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey. Ad Hoc Networks, 24, 264–287.
- He, Y., Zhou, Z., Pan, Y., Chong, F., Wu, B., Xiao, K., & Li, H. (2024). Review of data security within energy blockchain: A comprehensive analysis of storage, management, and utilization. High-Confidence Computing, 100233.
- Singh, A., & Jain, K. (2022). An efficient secure key establishment method in cluster-based sensor network. Telecommunication Systems, 79(1), 3–16.
- Gautam, A. K., & Kumar, R. (2021). A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks. SN Applied Sciences, 3(1), 50.
- Singh, P., Acharya, B., & Chaurasiya, R. K. (2021). Lightweight cryptographic algorithms for resource-constrained IoT devices and sensor networks. In Security and Privacy Issues in IoT Devices and Sensor Networks (pp. 153–185). Academic Press.
- Singh, S., Sharma, P. K., Moon, S. Y., & Park, J. H. (2024). Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. Journal of Ambient Intelligence and Humanized Computing, 1–18.
- Khan, M. N., Rao, A., & Camtepe, S. (2020). Lightweight cryptographic protocols for IoT-constrained devices: A survey. IEEE Internet of Things Journal, 8(6), 4132–4156.
- Pandey, S., & Bhushan, B. (2024). Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks. Wireless Networks, 30(4), 2987–3026.
- Iqbal, S., & Sujatha, B. R. (2024). Secure authentication and key management based on hierarchical enhanced identity based digital signature in heterogeneous wireless sensor network. Wireless Networks, 1–21.
- Gopalakrishnan, K. (2020). Security vulnerabilities and issues of traditional wireless sensors networks in IoT. Principles of internet of things (IoT) ecosystem: Insight paradigm, 519–549.
- Oztoprak, A., Hassanpour, R., Ozkan, A., & Oztoprak, K. (2024). Security Challenges, Mitigation Strategies, and Future Trends in Wireless Sensor Networks: A Review. ACM Computing Surveys.
- Kampourakis, V., Gkioulos, V., & Katsikas, S. (2023). A systematic literature review on wireless security testbeds in the cyber-physical realm. Computers & Security, 103383.
- Saeed, M. M., Ali, E. S., & Saeed, R. A. (2023). Data-driven techniques and security issues in wireless networks. In Data-Driven Intelligence in Wireless Networks (pp. 107–154). CRC Press.
- Alghamdi, A., Al Shahrani, A. M., AlYami, S. S., Khan, I. R., Sri, P. A., Dutta, P., ... & Venkatareddy, P. (2024). Security and energy efficient cyber-physical systems using predictive modeling approaches in wireless sensor network. Wireless Networks, 30(6), 5851–5866.
- Jain, K., & Kumar, A. (2020). Energy-efficient data-aggregation technique for correlated spatial and temporal data in cluster-based sensor networks. International Journal of Business Data Communications and Networking (IJBDCN), 16(2), 53–68.
- Agarwal, A., Dev, A., & Jain, K. (2020). Prolonging sensor network lifetime by using energy-efficient cluster-based scheduling. Int J Sci Technol Res, 9(4), 3410–3415.
- L. Eschenauer and V. D. Gligor, “A key-management scheme for distributed sensor networks”, Proc. ACM Conf. Comput. Commun. Securit, pp. 41–47, 2002-Nov.
- Albrecht, M., Gentry, C., Halevi, S., & Katz, J. (2009, November). Attacking cryptographic schemes based on “perturbation polynomials”. In Proceedings of the 16th ACM conference on Computer and communications security (pp. 1–10).
- Saha, R., Geetha, G., Kumar, G., & Kim, T. H. (2018). RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys. Security and Communication Networks, 2018(1), 9802475.
- Masaeli, N., Javadi, H. H. S., & Erfani, S. H. (2020). Key pre-distribution scheme based on transversal design in large mobile fog networks with multi-clouds. Journal of Information Security and Applications, 54, 102519.
- Kandi, M. A., Kouicem, D. E., Doudou, M., Lakhlef, H., Bouabdallah, A., & Challal, Y. (2022). A decentralized blockchain-based key management protocol for heterogeneous and dynamic IoT devices. Computer Communications, 191, 11–25.
- Verma, R. M., & Basile, B. E. (2013, June). Modeling and analysis of LEAP, a key management protocol for wireless sensor networks. In 2013 IEEE International Workshop on Security and Privacy of Mobile, Wireless, and Sensor Networks (MWSN) (pp. 23–25). IEEE.
- Yu, X., Fang, J., & Zhang, Z. (2013). A Security Mechanism Based on Authenticated Diffie-Hellman for WSN. TELKOMNIKA Indonesian Journal of Electrical Engineering, 11(6), 3349–3354.
- Mehra, P. S., Doja, M. N., & Alam, B. (2019). Codeword Authenticated Key Exchange (CAKE) light weight secure routing protocol for WSN. International Journal of Communication Systems, 32(3), e3879.
- Chen, C. M., Deng, X., Gan, W., Chen, J., & Islam, S. H. (2021). A secure blockchain-based group key agreement protocol for IoT. The Journal of Supercomputing, 77, 9046–9068.
- Singh, A., & Jain, K. (2022). An automated lightweight key establishment method for secure communication in WSN. Wireless Personal Communications, 124(4), 2831–2851.
- Msolli, A., Ajmi, N., Helali, A., Gassoumi, A., Maaref, H., & Mghaieth, R. (2023). New key management scheme based on pool-hash for WSN and IoT. Journal of Information Security and Applications, 73, 103415.
- Jain, K., & Singh, A. (2024). IHKM: an improved hierarchical key management scheme for wireless sensor network. Telecommunication Systems, 1–16.
- Di Pietro, R., Mancini, L. V., & Mei, A. (2010). Hierarchies of keys in secure multicast communications. Journal of Computer Security, 18(5), 839–860.
- Doraipandian, M., & Neelamegam, P. (2015). An Efficient Key Management Scheme in Multi-Tier and Multi-Cluster Wireless Sensor Networks. Int. J. Netw. Secur., 17(6), 651–660.
- Li, Z., Wang, H., & Fang, H. (2017). Group-based cooperation on symmetric key generation for wireless body area networks. IEEE Internet of Things Journal, 4(6), 1955–1963.
- Amutha, J., Sharma, S., & Sharma, S. K. (2022). An energy efficient cluster based hybrid optimization algorithm with static sink and mobile sink node for Wireless Sensor Networks. Expert Systems with Applications, 203, 117334.
- Ruj, S., Nayak, A., & Stojmenovic, I. (2012). Pairwise and triple key distribution in wireless sensor networks with applications. IEEE Transactions on Computers, 62(11), 2224–2237.
- Baburaj, E. (2017). Polynomial and multivariate mapping-based triple-key approach for secure key distribution in wireless sensor networks. Computers & Electrical Engineering, 59, 274–290.
- Das, A. K., Wazid, M., Yannam, A. R., Rodrigues, J. J., & Park, Y. (2019). Provably secure ECC-based device access control and key agreement protocol for IoT environment. IEEE Access, 7, 55382–55397.
- Yu, B., & Li, H. (2019). Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things. International Journal of Distributed Sensor Networks, 15(9), 1550147719879379.
- Zhao, G., Yang, X., Zhou, B., & Wei, W. (2010, July). RSA-based digital image encryption algorithm in wireless sensor networks. In 2010 2nd International conference on signal processing systems (Vol. 2, pp. V2-640). IEEE.
- Chatterjee, S., & Das, A. K. (2015). An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks. Security and Communication Networks, 8(9), 1752–1771.
- Ali, I., Hassan, A., & Li, F. (2019). Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey. Vehicular Communications, 16, 45–61.
- Dhanda, S. S., Singh, B., & Jindal, P. (2020). Lightweight cryptography: a solution to secure IoT. Wireless Personal Communications, 112(3), 1947–1980.
- Twardokus, G., Bindel, N., Rahbari, H., & McCarthy, S. (2022). When cryptography needs a hand: Practical post-quantum authentication for V2V communications. Cryptology ePrint Archive.
- Ganeshan, A., Jayagopalan, S., Perumal, B., & Sarveshwaran, V. (2023). Secure identity key and blockchain-based authentication approach for secure data communication in multi-WSN. Concurrency and Computation: Practice and Experience, 35(28), e7861.
- Almuseelem, W. (2023). Energy-efficient and security-aware task offloading for multi-tier edge-cloud computing systems. IEEE Access.
- Aydeger, A., Zeydan, E., Yadav, A. K., Hemachandra, K. T., & Liyanage, M. (2024, October). Towards a quantum-resilient future: Strategies for transitioning to post-quantum cryptography. In 2024 15th International Conference on Network of the Future (NoF) (pp. 195–203). IEEE.
- Ahlawat, P., & Dave, M. (2018). A cost-effective attack matrix based key management scheme with dominance key set for wireless sensor network security. International Journal of Communication Systems, 31(12), e3713.
- Dinker, A. G., & Sharma, V. (2019). Polynomial and matrix based key management security scheme in wireless sensor networks. Journal of Discrete Mathematical Sciences and Cryptography, 22(8), 1563–1575.
- Roy, K. S., Deb, S., & Kalita, H. K. (2024). A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks. Digital Communications and Networks, 10(4), 989–1000.
- Kumar, V., Malik, N., Dhiman, G., & Lohani, T. K. (2021). Scalable and storage efficient dynamic key management scheme for wireless sensor network. Wireless Communications and Mobile Computing, 2021(1), 5512879.
- Xu, C., & Liu, W. (2014). Key updating methods for combinatorial design based key management schemes. Journal of Sensors, 2014(1), 134357.
- Kumar, A., & Pais, A. R. (2019). A new combinatorial design based key pre-distribution scheme for wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing, 10, 2401–2416.
- Solari Esfehani, N., & Haj Seyyed Javadi, H. (2021). A survey of key pre-distribution schemes based on combinatorial designs for resource-constrained devices in the IoT network. Wireless Networks, 27(4), 3025–3052.
- Mahamat, M., Jaber, G., & Bouabdallah, A. (2023). Achieving efficient energy-aware security in IoT networks: a survey of recent solutions and research challenges. Wireless Networks, 29(2), 787–808.
- Poornima, M. R., Vimala, H. S., & Shreyas, J. (2023). Holistic survey on energy aware routing techniques for IoT applications. Journal of Network and Computer Applications, 213, 103584.
- Jain, K., Agarwal, A., & Abraham, A. (2022). A combinational data prediction model for data transmission reduction in wireless sensor networks. IEEE Access, 10, 53468–53480.
- Rao, P. M., & Deebak, B. D. (2023). A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions. Ad Hoc Networks, 146, 103159.
- Sen, J. (2023). A survey of cryptography and key management schemes for wireless sensor networks. In Wireless Sensor Networks-Design, Applications and Challenges. IntechOpen.
- Gupta, M., & Jain, K. (2024). A Comprehensive Survey of Aerial Mesh Networks (AMN): Characteristics, Application, Open Issues, Challenges, and Research Directions. Wireless Personal Communications, 138(1), 333–368.
- Fathalla, E., & Azab, M. (2024). Beyond Classical Cryptography: A Systematic Review of Post-Quantum Hash-Based Signature Schemes, Security, and Optimizations. IEEE Access.
- Shim, K. A. (2021). A survey on post-quantum public-key signature schemes for secure vehicular communications. IEEE Transactions on Intelligent Transportation Systems, 23(9), 14025–14042.
- Surla, G., & Lakshmi, R. (2023). Design and evaluation of novel hybrid quantum resistant cryptographic system for enhancing security in wireless body sensor networks. Optical and Quantum Electronics, 55(14), 1252.
- Al-Mekhlafi, Z. G., Al-Janabi, H. D. K., Khalil, A., Al-Shareeda, M. A., Mohammed, B. A., Alsadhan, A. A., ... & Almekhlafi, K. (2024). Lattice-Based Cryptography and Fog Computing Based Efficient Anonymous Authentication Scheme for 5G-Assisted Vehicular Communications. IEEE Access.
- Sharma, P., & BR, P. (2024). A lightweight group key management scheme with constant rekeying cost and public bulletin size. Information Security Journal: A Global Perspective, 33(2), 97–120.
- Logeshwaran, J., Shanmugasundaram, R. N., & Lloret, J. (2024). Load based dynamic channel allocation model to enhance the performance of device-to-device communication in WPAN. Wireless Networks, 1–33.
- Sapra, V., Sapra, L., Bhardwaj, A., Almogren, A., Bharany, S., Ur Rehman, A., & Ouahada, K. (2024). Diabetic Retinopathy Detection Using Deep Learning with Optimized Feature Selection. Traitement du Signal, 41(2).
- Khashan, O. A., Khafajah, N. M., Alomoush, W., Alshinwan, M., & Alomari, E. (2024). Smart energy-efficient encryption for wireless multimedia sensor networks using deep learning. IEEE Open Journal of the Communications Society.
- Logeshwaran, J., Shanmugasundaram, R. N., & Lloret, J. (2024). Load based dynamic channel allocation model to enhance the performance of device-to-device communication in WPAN. Wireless Networks, 1–33.
Language: English
Page range: 18 - 37
Published on: Feb 28, 2025
Published by: Cerebration Science Publishing Co., Limited
In partnership with: Paradigm Publishing Services
Publication frequency: 6 issues per year
Keywords:
Related subjects:
© 2025 Khushboo Jain, published by Cerebration Science Publishing Co., Limited
This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 License.