An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems

[1]  Saman Shojae Chaeikar,et al.  PFW: Polygonal Fuzzy Weighted—An SVM Kernel for the Classification of Overlapping Data Groups , 2020, Electronics.

[2]  Laurence T. Yang,et al.  A Secure High-Order CFS Algorithm on Clouds for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[3]  Hong Li,et al.  A survey of intrusion detection on industrial control systems , 2018, Int. J. Distributed Sens. Networks.

[4]  Maurizio Rebaudengo,et al.  Transitory Master Key Transport Layer Security for WSNs , 2020, IEEE Access.

[5]  Sergii Kavun,et al.  Complex systems modeling with intelligent control elements , 2017, Int. J. Model. Simul. Sci. Comput..

[6]  M. Hadi Amini,et al.  Key pre-distribution scheme with join leave support for SCADA systems , 2019, Int. J. Crit. Infrastructure Prot..

[7]  Maurizio Rebaudengo,et al.  A Key Management Scheme for Mobile Wireless Sensor Networks , 2017 .

[8]  Sherali Zeadally,et al.  Certificateless Public Key Authenticated Encryption With Keyword Search for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[9]  Mazdak Zamani,et al.  Security Features Comparison of Master Key and IKM Cryptographic Key Management for Researchers and Developers , 2011 .

[10]  Ashutosh Sharma,et al.  A Secure Communicating Things Network Framework for Industrial IoT using Blockchain Technology , 2019, Ad Hoc Networks.

[11]  Elaine B. Barker,et al.  Recommendation for Key Management - Part 2: Best Practices for Key Management Organization , 2014 .

[12]  Hamid Barati,et al.  Dynamic key management algorithms in wireless sensor networks: A survey , 2019, Comput. Commun..

[13]  Banshidhar Majhi,et al.  CL-AGKA: certificateless authenticated group key agreement protocol for mobile networks , 2020, Wirel. Networks.

[14]  John Yearwood,et al.  Securing the operations in SCADA-IoT platform based industrial control system using ensemble of deep belief networks , 2018, Appl. Soft Comput..

[15]  Naixue Xiong,et al.  A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks , 2016, Sensors.

[16]  Fenghua Li,et al.  Privacy-Oriented Blockchain-Based Distributed Key Management Architecture for Hierarchical Access Control in the IoT Scenario , 2019, IEEE Access.

[17]  Gang Xu,et al.  A novel protocol for multiparty quantum key management , 2015, Quantum Inf. Process..

[18]  Jaydip Sen Cryptography and Security in Computing , 2014 .

[19]  Zhe Xia,et al.  Lightweight group key distribution schemes based on pre-shared pairwise keys , 2020, IET Commun..

[20]  Youliang Tian,et al.  A Blockchain-Based Secure Key Management Scheme With Trustworthiness in DWSNs , 2020, IEEE Transactions on Industrial Informatics.

[21]  Saman Shojae Chaeikar,et al.  Ensemble SW image steganalysis: A low dimension method for LSBR detection , 2019, Signal Process. Image Commun..

[22]  Okyay Kaynak,et al.  Industrial Cyberphysical Systems: A Backbone of the Fourth Industrial Revolution , 2017, IEEE Industrial Electronics Magazine.

[23]  Ching-Han Chen,et al.  High-level modeling and synthesis of smart sensor networks for Industrial Internet of Things , 2017, Comput. Electr. Eng..

[24]  Morteza Nikooghadam,et al.  A lightweight key management protocol for secure communication in smart grids , 2020 .

[25]  Seokjun Lee,et al.  Design and implementation of cybersecurity testbed for industrial IoT systems , 2017, The Journal of Supercomputing.

[26]  Klaus-Dieter Thoben,et al.  Security framework for industrial collaborative robotic cyber-physical systems , 2018, Comput. Ind..

[27]  Jing Ma,et al.  A Centralized Key Management Scheme Based on McEliece PKC for Space Network , 2020, IEEE Access.

[28]  Lei Zhang,et al.  Key Management Scheme for Secure Channel Establishment in Fog Computing , 2021, IEEE Transactions on Cloud Computing.

[29]  Akram M. Zeki,et al.  PSW statistical LSB image steganalysis , 2016, Multimedia Tools and Applications.