Please use this identifier to cite or link to this item: http://ir.futminna.edu.ng:8080/jspui/handle/123456789/11837
Full metadata record
DC FieldValueLanguage
dc.contributor.authorTaofeek, Yusuf-
dc.contributor.authorWaziri, Victor Onomza-
dc.contributor.authorAbdullahi, Bashir Mohammed-
dc.contributor.authorOlalere, Morufu-
dc.date.accessioned2021-07-27T11:43:43Z-
dc.date.available2021-07-27T11:43:43Z-
dc.date.issued2020-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/11837-
dc.description.abstractThe need for efficient and secure key revocation protocols in Wireless Sensor Networks (WSNs) is a challenge in the design of protocols that will meet the severe constraints that characterized the WSNs. This study presents analysis and comparison of centralized key revocation protocols in WSNs. In this context, the study presents the representative number of centralized key revocation protocols and a comparative summary of their significant features. The authors carried out a security and performance analysis of the presented protocols based on security goals of confidentiality, integrity, authenticity, availability and their related attacks. Finally, the work compares their security and performance metrics, with the aim of identifying efficient and secure key revocation alternatives.en_US
dc.language.isoenen_US
dc.subjectWireless Sensor Networken_US
dc.subjectKey Managementen_US
dc.subjectKey Revocationen_US
dc.subjectIntrusion Detection Systemen_US
dc.titleAnalysis and Comparison of Key Revocation Protocols in Wireless Sensor Networken_US
dc.typeArticleen_US
Appears in Collections:Cyber Security Science

Files in This Item:
File Description SizeFormat 
Yusuf et al 2020_revocation.pdf275.59 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.