﻿<?xml version="1.0" encoding="utf-8"?>
<ArticleSet>
  <ARTICLE>
    <Journal>
      <PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName>
      <JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle>
      <ISSN>2322-1437</ISSN>
      <Volume>10</Volume>
      <Issue>37</Issue>
      <PubDate PubStatus="epublish">
        <Year>2022</Year>
        <Month>2</Month>
        <Day>19</Day>
      </PubDate>
    </Journal>
    <ArticleTitle>Secure Key Management Scheme for Hierarchical Network Using Combinatorial Design</ArticleTitle>
    <VernacularTitle>Secure Key Management Scheme for Hierarchical Network Using Combinatorial Design</VernacularTitle>
    <FirstPage>20</FirstPage>
    <LastPage>27</LastPage>
    <ELocationID EIdType="doi">10.52547/jist.15691.10.37.20</ELocationID>
    <Language>en</Language>
    <AuthorList>
      <Author>
        <FirstName>Siddiq</FirstName>
        <LastName>Iqbal</LastName>
        <Affiliation>Institute of Technology &amp; Management, Bengaluru, India</Affiliation>
      </Author>
      <Author>
        <FirstName>B R </FirstName>
        <LastName>Sujatha</LastName>
        <Affiliation>Malnad College of Engineering, Hassan</Affiliation>
      </Author>
    </AuthorList>
    <History PubStatus="received">
      <Year>2021</Year>
      <Month>1</Month>
      <Day>31</Day>
    </History>
    <Abstract>The wireless sensor network (WSN) signifies to a gathering of spatially spread and committed sensors for observing and logging the physical states of the environment and for organizing the information gathered at the central Base station. Many security threats may affect the functioning of these networks. Security of the data in the system depends on the cryptographic procedure and the methods where encryption and decryption keys are developed among the sensors. Symmetric key foundation is one of the best applicable ideal models for safe exchanges in WSNs. The main goal is to improve and evaluate certain issues, such as node attack, to provide better key strength, connectivity, security for node interaction, and throughput. Uniform Balanced Incomplete Block Design (UBIBD) is used to generate the keys allocated by the base station to the cluster head. The cluster head distributes keys to its members using Symmetric Balanced Incomplete Block Design (SBIBD), and the keys are refreshed on a regular basis to avoid out-of-date entries. In wireless sensor networks, compromised nodes can be used to inject false reports. The concept of interacting between sensor nodes using keys and establishing a secure connection aids in ensuring the network's security.</Abstract>
    <ObjectList>
      <Object Type="Keyword">
        <Param Name="Value">Wireless sensor networks</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">combinatorial design</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">key management</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">Key distribution</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">key refreshment</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">Balanced Incomplete Block Design.</Param>
      </Object>
    </ObjectList>
    <ArchiveCopySource DocType="Pdf">http://jist.ir/fa/Article/Download/15691</ArchiveCopySource>
  </ARTICLE>
</ArticleSet>