Метод перевірено на чіпі LoRa EBYTE SX1262 з ESP-WROOM-32. Використовувалися алгоритми прогнозування часу оновлення. Бездротові мережі MESH важливі для забезпечення зв’язку в умовах, коли інфраструктура зв’язку обмежена або відсутня. У таких мережах управління ключами шифрування відіграє важливу роль у забезпеченні безпеки передачі даних. У роботі аналізуються існуючі підходи до управління ключами шифрування в бездротових мережах і пропонується метод оптимального оновлення ключів.
- Hoa, L. V., & Vinh, T. Q. Real-time Key Management for Wireless Mesh Network. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), Vol. 10 No. 2-6, 2018, pp.13–18. Retrieved from https://jtec.utem.edu.my/jtec/article/view/4362
- Gianni D’Angelo, Francesco Palmieri. A hound-inspired pre-hybridized genetic approach for router placement in wireless mesh networks. Applied Soft Computing. Vol 166, 2024, р.112159, doi.org/10.1016/j.asoc.2024.112159
- R. Imam, Q.M. Areeb, A. Alturki, F. Anwer Systematic and critical review of RSA based public key cryptographic schemes: past and present status. IEEE Access, 9, 2021, pp. 155949-155976, doi.org/10.1109/ACCESS.2021.3129224
- Abdmeziem, M. R., & Ahmed Nacer, A., & Deroues, N.M. Group key management in the Internet of Things: Handling asynchronicity. Future Generation Computer Systems, Volume 152, 2024, pp. 273-287, doi.org/10.1016/j.future.2023.10.023
- Bruno Ramos-Cruz, JavierAndreu-Perez, Luis Martínez. The cybersecurity mesh: A comprehensive survey of involved artificial intelligence methods, cryptographic protocols and challenges for future research. Neurocomputing. Volume 581, р.1274277, 2024, doi.org/10.1016/j.neucom.2024.127427
- Osama A. Khashan a, Rami Ahmad b, Nour M. Khafajah. An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks. Ad Hoc Networks. Vol 115, 2021, р. 102448, doi.org/10.1016/j.adhoc.2021.102448
- Abdmeziem, M. R., & Ahmed Nacer, A., & Deroues, N.M (2024). Group key management in the Internet of Things: Handling asynchronicity. Future Generation Computer Systems, Volume 152, pp. 273-287, doi.org/10.1016/ j.future.2023.10.023
- Xueping Yan, Lin Tan, Hong Xu, Wenfeng Qi. Improved mixture differential attacks on 6-round AES-like ciphers towards time and data complexities. Journal of Information Security and Applications,Volume 80, 2024, р. 103661, doi.org/10.1016/j.jisa.2023.103661
- Miguel Antonio Caraveo-Cacep a b 1, Rubén Vázquez- Medina a 1, Antonio Hernández Zavala. A survey on low- cost development boards for applying cryptography in IoT systems. Internet of Things. Vol 22, 2023, р. 100743, doi.org/10.1016/j.iot.2023.100743.
- Antonio Muñoz, Ruben Ríos, Rodrigo Román, Javier López. A survey on the (in) security of trusted execution environments. Computers & Security. Vol129, 2023, 103180, doi.org/10.1016/j.cose.2023.103180
- Kendall Niles a, Jason Ray a, Kenneth Niles a, Andrew Maxwell a, Anton Netchaev. Monitoring for Analytes through LoRa and LoRaWAN Technology. Procedia Computer Science. Vol 185, 2021, pp. 152-159, doi.org/10.1016/j.procs.2021.05.041
- Inc, Atecc608a, secure element to secure authentication. Accessed on 27.10.2022. www.microchip.com/en- us/product/ATECC608A
- Yasmeen Shaher Alslman1, Ashraf Ahmad1, Yousef AbuHour. Enhanced and authenticated cipher block chaining mode. Bulletin of Electrical Engineering and Informatics. Vol.12(4), 2023, pp. 2357-2362 doi:10.11591/beei.v12i4.5113
- R. Imam, Q.M. Areeb, A. Alturki, F. Anwer Systematic and critical review of RSA based public key cryptographic schemes: past and present status. IEEE Access, 9, 2021, pp. 155949-155976, doi.org/10.1109/ACCESS.2021.3129224
- Nil Llisterri Giménez, Joan Miquel Solé, Felix Freitag. Embedded federated learning over a LoRa mesh network. Pervasive and Mobile Computing. Vol 93, 2023, р.101819, doi.org/10.1016/j.pmcj.2023.101819
- Kun-Lin Tsai, Li-Woei Chen, Fang-Yie Leu, Chuan-Tian Wu. Two-Stage High-Efficiency Encryption Key Update Scheme for LoRaWAN Based IoT Environment. Computers, Materials and Continua. Vol 73, №1, 2022, pp. 547-562, doi.org/10.32604/cmc.2022.026557
- S. Anbazhagan, R.K. Mugelan. Next-gen resource opti- mization in NB-IoT networks: Harnessing soft actor–critic reinforcement learning. Computer Networks. Vol 252, 2024, р.110670, doi.org/10.1016/j.comnet.2024.110670