On the Performance of a Secure Storage Mechanism for Key Distribution Architectures in Wireless Sensor Networks [PDF]
Security in wireless sensor networks (WSNs) demands efficient key management schemes. In particular, one of the main research challenges is to ensure secure key storage by sensors due to their constrained resources and high exposure to tampering attempts.
Juliano F. Kazienko +3 more
doaj +2 more sources
Secure Key Distribution Using Fragmentation and Assimilation in Wireless Sensor and Actor Networks
Secure key distribution is one of the most important building blocks to ensure confidentiality in wireless sensor and actor networks (WSANs). However, the key distribution becomes a challenging task when keys have to be relayed by compromised nodes in ...
AtaUllah Ghafoor +3 more
doaj +2 more sources
Improved Key Distribution and Management in Wireless Sensor Network
Key set up and distribution in sensor network is a complex task due to inherent limitations in sensor networks. For reducing the “communication and computation overhead” we proposed that the sensor network is partitioned into different zones. Each zone has a separate intrusion detection system (IDS) and key distribution center (KDC).IDS can detect the ...
Vishal Choudhary, Sunil Taruna
openaire +3 more sources
Non-Interactive Group Key Pre-Distribution Scheme (GKPS) for End-to-End Routing in Wireless Sensor Networks [PDF]
A novel design of secure end-to-end routing protocol in wireless sensor networks was recently proposed by Harn et al. Their design is based on a group key pre-distribution scheme (GKPS) using a multivariate polynomial. A group key also called a path key,
Ashwag Albakri, Lein Harn
doaj +2 more sources
Implementation of Elliptic Curves in the Polynomial Blom Key Pre-Distribution Scheme for Wireless Sensor Networks and Distributed Ledger Technology [PDF]
One of the challenges in securing wireless sensor networks (WSNs) is the key distribution; that is, a single shared key must first be known to a pair of communicating nodes before they can proceed with the secure encryption and decryption of the data. In
Siti Noor Farwina Mohamad Anwar Antony +1 more
doaj +2 more sources
Distributed Key Management to Secure IoT Wireless Sensor Networks in Smart-Agro [PDF]
With the deepening of the research and development in the field of embedded devices, the paradigm of the Internet of things (IoT) is gaining momentum. Its technology’s widespread applications increasing the number of connected devices constantly.
Safwan Mawlood Hussein +2 more
doaj +4 more sources
Grouping Sensors for the Key Distribution of Implicit Certificates in Wireless Sensor Networks [PDF]
As sensor nodes communicate via wireless channels, information security is essential for wireless sensor networks. Efficient protection mechanisms to ensure data security among nodes are critical. This study developed the bi-directed grouping (top-down grouping (TDG) and bottom-up grouping (BUG)) methods.
Ray-I Chang +2 more
openaire +2 more sources
A Hybrid Key Pre-Distribution Scheme for Securing Communications in Wireless Sensor Networks
Wireless Sensor Network (WSN) is a type of ad hoc networks which consist of hundreds to thousands of sensor nodes. These sensor nodes collaborate to surveillance environment.
Mojtaba Jamshidi +3 more
doaj +3 more sources
A Group Key Distribution Scheme for Wireless Sensor Networks in the Internet of Things Scenario
As an indispensable part of the Internet of Things (IoT), wireless sensor networks (WSNs) need to be completely integrated into the Internet. When an Internet user communicates with multiple sensor nodes in WSNs, secure group key management becomes ...
Hong Yu +3 more
doaj +2 more sources
Hierarchical Grid-Based Pairwise Key Pre-distribution in Wireless Sensor Networks [PDF]
The security of wireless sensor networks is an active topic of research where both symmetric and asymmetric key cryptography issues have been studied. Due to their computational feasibility on typical sensor nodes, symmetric key algorithms that use the same key to encrypt and decrypt messages have been intensively studied and perfectly deployed in such
Mohaisen, Abedelaziz +2 more
openaire +3 more sources

