<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">SamirAthmani</style></author><author><style face="normal" font="default" size="100%">Azeddine Bilami</style></author><author><style face="normal" font="default" size="100%">Djallel Eddine Boubiche</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">EDAK: An Efficient Dynamic Authentication and Key Management Mechanism for heterogeneous WSNs</style></title><secondary-title><style face="normal" font="default" size="100%">Future Generation Computer SystemsFuture Generation Computer Systems</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2019</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">92</style></volume><pages><style face="normal" font="default" size="100%">789-799</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Securing the network communication represents one of the most important challenges in&amp;nbsp;wireless sensor networks. The key distribution problem has been widely discussed in classical wireless sensor networks contrarily to heterogeneous ones. HWSNs (Heterogeneous Wireless Sensor Networks) have optimized the network capability and opened new security opportunities by introducing high resource capacity&amp;nbsp;sensor nodes&amp;nbsp;in the network. In this paper, an efficient dynamic&amp;nbsp;authentication&amp;nbsp;and&amp;nbsp;key Management scheme&amp;nbsp;is proposed for heterogeneous WSN. The main idea is to provide a single lightweight protocol for both authentication and key establishment while optimizing the security level. The key distribution algorithm is based on preexisting information to generate dynamic keys and does not require any secure channel and sharing phase which improves the security, energy efficiency and reduces the memory consumption. Experimental results have confirmed the performances of our mechanism compared to some of the existing security protocols.</style></abstract></record></records></xml>