{"id":7005,"date":"2023-01-26T16:31:49","date_gmt":"2023-01-26T13:31:49","guid":{"rendered":"http:\/\/engineering.tiu.edu.iq\/computer\/?p=7005"},"modified":"2023-06-26T10:51:53","modified_gmt":"2023-06-26T07:51:53","slug":"distributed-key-management-in-iot","status":"publish","type":"post","link":"https:\/\/engineering.tiu.edu.iq\/computer\/distributed-key-management-in-iot\/","title":{"rendered":"Seminar: A Secure and Efficient Method to Protect Communications and Energy Consumption in IoT Wireless Sensor Networks"},"content":{"rendered":"<p>Less formal than a class lecture, a seminar allows for small groups to meet and discuss academic topics or required reading, as well as set goals for research and continuing investigation.<\/p>\n<p>The following seminar was conducted on 26-01-2023 at 10:30 AM by Mr Safwan Mawlood, Vice Dean Faculty of Engineering<\/p>\n<p>Synopsis (Abstract) about the seminar:<br \/>\nThe rapid growth of technology has resulted in the deployment of a large number of interconnected devices, resulting in a wide range of new societal services. Wireless sensor networks (WSNs) are a promising technology which is faced with the challenges of operating a large number of sensor nodes, information gathering, data transmission, and providing a means to act in different scenarios such as monitoring, surveillance, forest fire detection, and many others from the civil to military spectrum. The deployment scenario, the nature of the sensor-equipped nodes, and their communication methods make this architecture extremely vulnerable to attacks, tampering, and manipulation than conventional networks. Therefore, an optimal solution to ensure security in such networks which captures the major constraints of the network in terms of energy utilization, secured data transmission, bandwidth, and memory fingerprint to process data is required. This work proposes a fast, reliable, and secure method of key distribution and management that can be used to ensure the integrity of wireless sensor networks&#8217; communications. Moreover, with regards to efficient energy utilization, an improvement of the Low Energy Adaptive Clustering Hierarchy (LEACH) algorithm (a cluster routing protocol that is mainly used in WS) has been proposed to enhance the networks energy efficiency, simplicity, and load-balancing features. Therefore, in this paper, we propose a combination of a distributed key exchange and management methods based on elliptic curve cryptography to ensure security of node communication and an improved routing protocol based on the LEACH protocol to demonstrate better performance in parameters such as network lifespan, dead nodes, and energy consumption.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Less formal than a class lecture, a seminar allows for small groups to meet and discuss academic topics or required reading, as well as set goals for research and continuing investigation. The following seminar was conducted on 26-01-2023 at 10:30 AM by Mr Safwan Mawlood, Vice Dean Faculty of Engineering Synopsis (Abstract) about the seminar: The rapid growth of technology has resulted in the deployment of a large number of interconnected devices, resulting in a wide range of new societal services. Wireless sensor networks (WSNs) are a promising technology which is faced with the challenges of operating a large number of <a href=\"https:\/\/engineering.tiu.edu.iq\/computer\/distributed-key-management-in-iot\/\"> [&#8230;]<\/a><\/p>\n","protected":false},"author":57,"featured_media":7110,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"wds_primary_category":0,"footnotes":""},"categories":[43],"tags":[],"class_list":["post-7005","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seminars"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Seminar: A Secure and Efficient Method to Protect Communications and Energy Consumption in IoT Wireless Sensor Networks - Computer Engineering Department<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/engineering.tiu.edu.iq\/computer\/distributed-key-management-in-iot\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Seminar: A Secure and Efficient Method to Protect Communications and Energy Consumption in IoT Wireless Sensor Networks - Computer Engineering Department\" \/>\n<meta property=\"og:description\" content=\"Less formal than a class lecture, a seminar allows for small groups to meet and discuss academic topics or required reading, as well as set goals for research and continuing investigation. The following seminar was conducted on 26-01-2023 at 10:30 AM by Mr Safwan Mawlood, Vice Dean Faculty of Engineering Synopsis (Abstract) about the seminar: The rapid growth of technology has resulted in the deployment of a large number of interconnected devices, resulting in a wide range of new societal services. Wireless sensor networks (WSNs) are a promising technology which is faced with the challenges of operating a large number of [...]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/engineering.tiu.edu.iq\/computer\/distributed-key-management-in-iot\/\" \/>\n<meta property=\"og:site_name\" content=\"Computer Engineering Department\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Tishkuniversity\/?ref=bookmarks\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-26T13:31:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-26T07:51:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/engineering.tiu.edu.iq\/computer\/wp-content\/uploads\/2023\/01\/web-posts-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Web Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@tishkuni\" \/>\n<meta name=\"twitter:site\" content=\"@tishkuni\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Web Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/distributed-key-management-in-iot\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/distributed-key-management-in-iot\/\"},\"author\":{\"name\":\"Web Admin\",\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/#\/schema\/person\/6950fcafea2cc5467e5114842fceb89e\"},\"headline\":\"Seminar: A Secure and Efficient Method to Protect Communications and Energy Consumption in IoT Wireless Sensor Networks\",\"datePublished\":\"2023-01-26T13:31:49+00:00\",\"dateModified\":\"2023-06-26T07:51:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/distributed-key-management-in-iot\/\"},\"wordCount\":330,\"publisher\":{\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/#organization\"},\"image\":{\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/distributed-key-management-in-iot\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/engineering.tiu.edu.iq\/computer\/wp-content\/uploads\/2023\/01\/web-posts-2.png\",\"articleSection\":[\"Seminars\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/distributed-key-management-in-iot\/\",\"url\":\"https:\/\/engineering.tiu.edu.iq\/computer\/distributed-key-management-in-iot\/\",\"name\":\"Seminar: A Secure and Efficient Method to Protect Communications and Energy Consumption in IoT Wireless Sensor Networks - Computer Engineering Department\",\"isPartOf\":{\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/distributed-key-management-in-iot\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/distributed-key-management-in-iot\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/engineering.tiu.edu.iq\/computer\/wp-content\/uploads\/2023\/01\/web-posts-2.png\",\"datePublished\":\"2023-01-26T13:31:49+00:00\",\"dateModified\":\"2023-06-26T07:51:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/distributed-key-management-in-iot\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/engineering.tiu.edu.iq\/computer\/distributed-key-management-in-iot\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/distributed-key-management-in-iot\/#primaryimage\",\"url\":\"https:\/\/engineering.tiu.edu.iq\/computer\/wp-content\/uploads\/2023\/01\/web-posts-2.png\",\"contentUrl\":\"https:\/\/engineering.tiu.edu.iq\/computer\/wp-content\/uploads\/2023\/01\/web-posts-2.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/distributed-key-management-in-iot\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/engineering.tiu.edu.iq\/computer\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seminar: A Secure and Efficient Method to Protect Communications and Energy Consumption in IoT Wireless Sensor Networks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/#website\",\"url\":\"https:\/\/engineering.tiu.edu.iq\/computer\/\",\"name\":\"TIU\",\"description\":\"The Future is Here\",\"publisher\":{\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/engineering.tiu.edu.iq\/computer\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/#organization\",\"name\":\"TIU\",\"url\":\"https:\/\/engineering.tiu.edu.iq\/computer\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"TIU\"},\"image\":{\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Tishkuniversity\/?ref=bookmarks\",\"https:\/\/x.com\/tishkuni\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/engineering.tiu.edu.iq\/computer\/#\/schema\/person\/6950fcafea2cc5467e5114842fceb89e\",\"name\":\"Web Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/3a47b9231d151155cd33bd25d059ecb52841805eb3d30eec2e06be3ffe6ee961?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3a47b9231d151155cd33bd25d059ecb52841805eb3d30eec2e06be3ffe6ee961?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3a47b9231d151155cd33bd25d059ecb52841805eb3d30eec2e06be3ffe6ee961?s=96&d=mm&r=g\",\"caption\":\"Web Admin\"},\"url\":\"https:\/\/engineering.tiu.edu.iq\/computer\/author\/web_admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Seminar: A Secure and Efficient Method to Protect Communications and Energy Consumption in IoT Wireless Sensor Networks - Computer Engineering Department","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/engineering.tiu.edu.iq\/computer\/distributed-key-management-in-iot\/","og_locale":"en_US","og_type":"article","og_title":"Seminar: A Secure and Efficient Method to Protect Communications and Energy Consumption in IoT Wireless Sensor Networks - Computer Engineering Department","og_description":"Less formal than a class lecture, a seminar allows for small groups to meet and discuss academic topics or required reading, as well as set goals for research and continuing investigation. The following seminar was conducted on 26-01-2023 at 10:30 AM by Mr Safwan Mawlood, Vice Dean Faculty of Engineering Synopsis (Abstract) about the seminar: The rapid growth of technology has resulted in the deployment of a large number of interconnected devices, resulting in a wide range of new societal services. Wireless sensor networks (WSNs) are a promising technology which is faced with the challenges of operating a large number of [...]","og_url":"https:\/\/engineering.tiu.edu.iq\/computer\/distributed-key-management-in-iot\/","og_site_name":"Computer Engineering Department","article_publisher":"https:\/\/www.facebook.com\/Tishkuniversity\/?ref=bookmarks","article_published_time":"2023-01-26T13:31:49+00:00","article_modified_time":"2023-06-26T07:51:53+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/engineering.tiu.edu.iq\/computer\/wp-content\/uploads\/2023\/01\/web-posts-2.png","type":"image\/png"}],"author":"Web Admin","twitter_card":"summary_large_image","twitter_creator":"@tishkuni","twitter_site":"@tishkuni","twitter_misc":{"Written by":"Web Admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/engineering.tiu.edu.iq\/computer\/distributed-key-management-in-iot\/#article","isPartOf":{"@id":"https:\/\/engineering.tiu.edu.iq\/computer\/distributed-key-management-in-iot\/"},"author":{"name":"Web Admin","@id":"https:\/\/engineering.tiu.edu.iq\/computer\/#\/schema\/person\/6950fcafea2cc5467e5114842fceb89e"},"headline":"Seminar: A Secure and Efficient Method to Protect Communications and Energy Consumption in IoT Wireless Sensor Networks","datePublished":"2023-01-26T13:31:49+00:00","dateModified":"2023-06-26T07:51:53+00:00","mainEntityOfPage":{"@id":"https:\/\/engineering.tiu.edu.iq\/computer\/distributed-key-management-in-iot\/"},"wordCount":330,"publisher":{"@id":"https:\/\/engineering.tiu.edu.iq\/computer\/#organization"},"image":{"@id":"https:\/\/engineering.tiu.edu.iq\/computer\/distributed-key-management-in-iot\/#primaryimage"},"thumbnailUrl":"https:\/\/engineering.tiu.edu.iq\/computer\/wp-content\/uploads\/2023\/01\/web-posts-2.png","articleSection":["Seminars"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/engineering.tiu.edu.iq\/computer\/distributed-key-management-in-iot\/","url":"https:\/\/engineering.tiu.edu.iq\/computer\/distributed-key-management-in-iot\/","name":"Seminar: A Secure and Efficient Method to Protect Communications and Energy Consumption in IoT Wireless Sensor Networks - Computer Engineering Department","isPartOf":{"@id":"https:\/\/engineering.tiu.edu.iq\/computer\/#website"},"primaryImageOfPage":{"@id":"https:\/\/engineering.tiu.edu.iq\/computer\/distributed-key-management-in-iot\/#primaryimage"},"image":{"@id":"https:\/\/engineering.tiu.edu.iq\/computer\/distributed-key-management-in-iot\/#primaryimage"},"thumbnailUrl":"https:\/\/engineering.tiu.edu.iq\/computer\/wp-content\/uploads\/2023\/01\/web-posts-2.png","datePublished":"2023-01-26T13:31:49+00:00","dateModified":"2023-06-26T07:51:53+00:00","breadcrumb":{"@id":"https:\/\/engineering.tiu.edu.iq\/computer\/distributed-key-management-in-iot\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/engineering.tiu.edu.iq\/computer\/distributed-key-management-in-iot\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/engineering.tiu.edu.iq\/computer\/distributed-key-management-in-iot\/#primaryimage","url":"https:\/\/engineering.tiu.edu.iq\/computer\/wp-content\/uploads\/2023\/01\/web-posts-2.png","contentUrl":"https:\/\/engineering.tiu.edu.iq\/computer\/wp-content\/uploads\/2023\/01\/web-posts-2.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/engineering.tiu.edu.iq\/computer\/distributed-key-management-in-iot\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/engineering.tiu.edu.iq\/computer\/"},{"@type":"ListItem","position":2,"name":"Seminar: A Secure and Efficient Method to Protect Communications and Energy Consumption in IoT Wireless Sensor Networks"}]},{"@type":"WebSite","@id":"https:\/\/engineering.tiu.edu.iq\/computer\/#website","url":"https:\/\/engineering.tiu.edu.iq\/computer\/","name":"TIU","description":"The Future is Here","publisher":{"@id":"https:\/\/engineering.tiu.edu.iq\/computer\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/engineering.tiu.edu.iq\/computer\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/engineering.tiu.edu.iq\/computer\/#organization","name":"TIU","url":"https:\/\/engineering.tiu.edu.iq\/computer\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/engineering.tiu.edu.iq\/computer\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"TIU"},"image":{"@id":"https:\/\/engineering.tiu.edu.iq\/computer\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Tishkuniversity\/?ref=bookmarks","https:\/\/x.com\/tishkuni"]},{"@type":"Person","@id":"https:\/\/engineering.tiu.edu.iq\/computer\/#\/schema\/person\/6950fcafea2cc5467e5114842fceb89e","name":"Web Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3a47b9231d151155cd33bd25d059ecb52841805eb3d30eec2e06be3ffe6ee961?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3a47b9231d151155cd33bd25d059ecb52841805eb3d30eec2e06be3ffe6ee961?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3a47b9231d151155cd33bd25d059ecb52841805eb3d30eec2e06be3ffe6ee961?s=96&d=mm&r=g","caption":"Web Admin"},"url":"https:\/\/engineering.tiu.edu.iq\/computer\/author\/web_admin\/"}]}},"_links":{"self":[{"href":"https:\/\/engineering.tiu.edu.iq\/computer\/wp-json\/wp\/v2\/posts\/7005","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/engineering.tiu.edu.iq\/computer\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/engineering.tiu.edu.iq\/computer\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/engineering.tiu.edu.iq\/computer\/wp-json\/wp\/v2\/users\/57"}],"replies":[{"embeddable":true,"href":"https:\/\/engineering.tiu.edu.iq\/computer\/wp-json\/wp\/v2\/comments?post=7005"}],"version-history":[{"count":4,"href":"https:\/\/engineering.tiu.edu.iq\/computer\/wp-json\/wp\/v2\/posts\/7005\/revisions"}],"predecessor-version":[{"id":7111,"href":"https:\/\/engineering.tiu.edu.iq\/computer\/wp-json\/wp\/v2\/posts\/7005\/revisions\/7111"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/engineering.tiu.edu.iq\/computer\/wp-json\/wp\/v2\/media\/7110"}],"wp:attachment":[{"href":"https:\/\/engineering.tiu.edu.iq\/computer\/wp-json\/wp\/v2\/media?parent=7005"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/engineering.tiu.edu.iq\/computer\/wp-json\/wp\/v2\/categories?post=7005"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/engineering.tiu.edu.iq\/computer\/wp-json\/wp\/v2\/tags?post=7005"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}