Results 1 to 10 of about 2,538,668 (296)

A pairwise key pre-distribution scheme for wireless sensor networks [PDF]

open access: greenProceedings of the 10th ACM conference on Computer and communication security - CCS '03, 2003
To achieve security in wireless sensor networks, it is important to be able to encrypt and authenticate messages sent among sensor nodes. Keys for encryption and authentication purposes must be agreed upon by communicating nodes.
Wenliang Du   +3 more
semanticscholar   +5 more sources

Efficient and Secure Key Distribution Protocol for Wireless Sensor Networks [PDF]

open access: goldSensors, 2018
Modern wireless sensor networks have adopted the IEEE 802.15.4 standard. This standard defines the first two layers, the physical and medium access control layers; determines the radio wave used for communication; and defines the 128-bit advanced ...
Majid Alshammari, Khaled Elleithy
semanticscholar   +6 more sources

An Asymmetric Encryption-Based Key Distribution Method for Wireless Sensor Networks [PDF]

open access: goldSensors, 2023
Wireless sensor networks are usually applied in hostile areas where nodes can easily be monitored and captured by an adversary. Designing a key distribution scheme with high security and reliability, low hardware requirements, and moderate communication ...
Yuan Cheng   +3 more
semanticscholar   +4 more sources

A survey of key distribution in wireless sensor networks [PDF]

open access: yesSecurity and Communication Networks, 2014
Key establishment is the most fundamental cryptographic primitive in all kinds of applications where security is a concern. However, the nature of limited resources on sensor nodes restricts the use of conventional key management techniques in wireless ...
Chi-Yuan Chen, H. Chao
semanticscholar   +2 more sources

PUF-based Key Distribution in Wireless Sensor Networks

open access: yesComputers, Materials & Continua, 2020
Physical Unclonable Functions (PUFs) can be seen as kind of hardware oneway functions, who are easily fabricated but difficult to clone, duplicate or predict.
Zheng Zhang   +5 more
semanticscholar   +2 more sources

Hierarchical Grid-Based Pairwise Key Pre-distribution in Wireless Sensor Networks [PDF]

open access: greenarXiv, 2008
The security of wireless sensor networks is an active topic of research where both symmetric and asymmetric key cryptography issues have been studied. Due to their computational feasibility on typical sensor nodes, symmetric key algorithms that use the same key to encrypt and decrypt messages have been intensively studied and perfectly deployed in such
Aziz Mohaisen   +2 more
arxiv   +3 more sources

Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks [PDF]

open access: bronzeIEEE/ACM Transactions on Networking, 2004
Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no priory knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory.
Seyit Camtepe, Bülent Yener
openalex   +5 more sources

Grouping Sensors for the Key Distribution of Implicit Certificates in Wireless Sensor Networks

open access: yesElectronics, 2023
As sensor nodes communicate via wireless channels, information security is essential for wireless sensor networks. Efficient protection mechanisms to ensure data security among nodes are critical.
R. Chang, Chien-Wen Chiang, Y. Hung
semanticscholar   +2 more sources

Non-Interactive Group Key Pre-Distribution Scheme (GKPS) for End-to-End Routing in Wireless Sensor Networks [PDF]

open access: goldIEEE Access, 2019
A novel design of secure end-to-end routing protocol in wireless sensor networks was recently proposed by Harn et al. Their design is based on a group key pre-distribution scheme (GKPS) using a multivariate polynomial. A group key also called a path key,
Ashwag Albakri, Lein Harn
openalex   +2 more sources

Low-Energy Symmetric Key Distribution in Wireless Sensor Networks [PDF]

open access: yesIEEE Transactions on Dependable and Secure Computing, 2011
In this work, a scheme for key distribution and network access in a Wireless Sensor Network (WSN) that utilizes Identity-Based Cryptography (IBC) is presented.
K. McCusker, N. O’Connor
semanticscholar   +4 more sources

Home - About - Disclaimer - Privacy