FOREX Press I. J. of Electrical & Electronics Research
Support Open Access

Research Article |

An Advanced and Efficient Cluster Key Management Scheme for Agriculture Precision IoT Based Systems

Author(s) : Sakshi Anand1 and Avinash Sharma2

Publisher : FOREX Publication

Published : 20 June 2022

e-ISSN : 2347-470X

Page(s) : 264-269




Sakshi Anand, PhD Scholar, CSE Department, M.M. Deemed to be University, Mullana, Haryana, India; Email: sakshi.girdhar.1@gmail.com

Avinash Sharma, Professor, CSE Department, M.M. Deemed to be University, Mullana, Haryana, India; Email: asharma@mmumullana.org

[1] Kumar, V., Malik, N., Dhiman, G. and Lohani, T.K. (2021), “Scalable and Storage Efficient Dynamic Key Management Scheme for Wireless Sensor Network”, edited by Shanmuganathan, V.Wireless Communications and Mobile Computing, Vol. 2021, pp. 1–11.[Cross Ref]

[2] Anand, S. and Sharma, A. (2021), “Hybrid Security Mechanism to Enhance the Security and Performance of IoT System”, IEEE Xplore, 1 December.[Cross Ref]

[3] Yadav, C., Yadav, V. and Kumar, J. (2021), “Secure and Reliable Data sharing scheme using Attribute-based Encryption with weighted attribute-based Encryption in Cloud Environment”, International Journal of Electrical and Electronics Research, Vol. 9 No. 3, pp. 48–56.[Cross Ref]

[4] Gulzar, B. and Gupta, A. (2021), “DAM: A Theoretical Framework for SensorSecurity in IoT Applications”, INTERNATIONAL JOURNAL of NEXT-GENERATION COMPUTING, Vol. 12 No. 3, available at: https://doi.org/10.47164/ijngc.v12i3.830. [Cross Ref]

[5] “Energy Efficient Cluster-Based Routing Protocol in Wireless Sensor Network using Flower Pollination Algorithm | IJEER”. (n.d.). Ijeer.forexjournal.co.in, available at: http://ijeer.forexjournal.co.in/archive/volume-4/ijeer-040308.php.[Cross Ref]

[6] Mehmood, G., Khan, M.S., Waheed, A., Zareei, M., Fayaz, M., Sadad, T., Kama, N., et al. (2021), “An Efficient and Secure Session Key Management Scheme in Wireless Sensor Network”, edited by Volchenkov, D.Complexity, Vol. 2021, pp. 1–10.[Cross Ref]

[7] Kumar, V. and Choudhary, A. (2021), “Solar Water Pumping Model Using Zeta Converter for Irrigation Application”, International Journal of Electrical and Electronics Research, Vol. 9 No. 3, pp. 84–88.[Cross Ref]

[8] Liao, B., Ali, Y., Nazir, S., He, L. and Khan, H.U. (2020), “Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review”, IEEE Access, Vol. 8, pp. 120331–120350.[Cross Ref]

[9] Jia, C., Ding, H., Zhang, C. and Zhang, X. (2021), “Design of a dynamic key management plan for intelligent building energy management system based on wireless sensor network and blockchain technology”, Alexandria Engineering Journal, Vol. 60 No. 1, pp. 337–346.[Cross Ref]

[10] Susan T, S.A. and Nithya, B. (2020), “Cluster Based Key Management Schemes in Wireless Sensor Networks: A Survey”, Procedia Computer Science, Vol. 171, pp. 2684–2693.[Cross Ref]

[11] Li, J., Wu, J., Chen, L., Li, J. and Lam, S.K. (2021), “Blockchain-based Secure Key Management for Mobile Edge Computing”, IEEE Transactions on Mobile Computing, pp. 1–1.[Cross Ref]

[12] Basile, M., Dini, G., Vernia, F. and Lamoglie, L. (2020), “A Secure and Efficient Group Key Management Scheme for Clusters of String Inverters”, Applied Sciences, available at: https://agris.fao.org/agris-search/search.do?recordID=DJ20210339955.[Cross Ref]

[13] Apsara, M.B., Dayananda, P. and Sowmyarani, C.N. (2020), “A Review on Secure Group Key Management Schemes for Data Gathering in Wireless Sensor Networks”, Engineering, Technology & Applied Science Research, Vol. 10 No. 1, pp. 5108–5112.[Cross Ref]

[14] Anand, S. and Sharma, A. (2020), “Assessment of security threats on IoT based applications”, Materials Today: Proceedings, available at: https://doi.org/10.1016/j.matpr.2020.09.350. [Cross Ref]

[15] Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P. and Sikdar, B. (2019), “A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures”, IEEE Access, Vol. 7, pp. 82721–82743.[Cross Ref]

[16] Anand, S. and Sharma, A. (2019), “Internet of Medical Things: Services, Applications and Technologies”, Journal of Computational and Theoretical Nanoscience, Vol. 16 No. 9, pp. 3995–3998.[Cross Ref]

[17] Zhou, W., Jia, Y., Peng, A., Zhang, Y. and Liu, P. (2019), “The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved”, IEEE Internet of Things Journal, Vol. 6 No. 2, pp. 1606–1616.[Cross Ref]

[18] Robinchandra Singh, U. and Roy, S. (2019), “Survey on Key Management Schemes and Cluster based Routing Protocols in Wireless Sensor Network”, Papers.ssrn.com, Rochester, NY, 22 March, available at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3358290. [Cross Ref]

[19] Anand, S. and Sharma, A. (2019b), “Issues and Concerns in Security of Cloud Environment in Internet of Things”, Journal of Computational and Theoretical Nanoscience, Vol. 16 No. 10, pp. 4374–4378.[Cross Ref]

[20] Chen, L. (2017), “Security Management for The Internet of Things”, Electronic Theses and Dissertations, available at: https://scholar.uwindsor.ca/etd/5932/. [Cross Ref]

[21] Corser, G. (2017), Internet of Things (IOT) Security Best Practices, available at: https://standards.ieee.org/wp-content/uploads/import/documents/other/whitepaper-internet-of-things-2017-dh-v1.pdf. [Cross Ref]

[22] Jawad, H., Nordin, R., Gharghan, S., Jawad, A. and Ismail, M. (2017), “Energy-Efficient Wireless Sensor Networks for Precision Agriculture: A Review”, Sensors, Vol. 17 No. 8, p. 1781.[Cross Ref]

[23] Riahi Sfar, A., Natalizio, E., Challal, Y. and Chtourou, Z. (2018), “A roadmap for security challenges in the Internet of Things”, Digital Communications and Networks, Vol. 4 No. 2, pp. 118–137.[Cross Ref]

[24] Hemapriya, K. and Gomathy, K. (2007), “IJARCCE A Survey Paper of Cluster based Key Management Techniques for Secured Data Transmission in Manet”, International Journal of Advanced Research in Computer and Communication Engineering ISO, Vol. 3297, available at: https://doi.org/10.17148/IJARCCE.2016.510102.[Cross Ref]

[25] Zhao, Q. and Liu, X. (2014), “Cluster Key Management Scheme for Wireless Sensor Networks”, Www.atlantis-Press.com, Atlantis Press, 1 May.[Cross Ref]

[26] Bao, X., Liu, J., She, L. and Zhang, S. (2014), “A key management scheme based on grouping within cluster”, IEEE Xplore, 1 June.[Cross Ref]

[27] Lalitha, T. and Umarani, R. (2011), “Energy Efficient Cluster Based key Management Technique for Wireless Sensor Networks”, Www.semanticscholar.org, available at: https://www.semanticscholar.org/paper/Energy-Efficient-Cluster-Based-key-Management-for-Lalitha Umarani/6721f474204f198be38226eebdde5c5d691368ba.[Cross Ref]

Sakshi Anand and Avinash Sharma (2022), An Advanced and Efficient Cluster Key Management Scheme for Agriculture Precision IoT Based Systems. IJEER 10(2), 264-269. DOI: 10.37391/IJEER.100235.