Results 1 to 10 of about 91,779 (225)
Efficient and Secure Key Distribution Protocol for Wireless Sensor Networks [PDF]
Modern wireless sensor networks have adopted the IEEE 802.15.4 standard. This standard defines the first two layers, the physical and medium access control layers; determines the radio wave used for communication; and defines the 128-bit advanced ...
Majid R. Alshammari+1 more
doaj +5 more sources
An Asymmetric Encryption-Based Key Distribution Method for Wireless Sensor Networks [PDF]
Wireless sensor networks are usually applied in hostile areas where nodes can easily be monitored and captured by an adversary. Designing a key distribution scheme with high security and reliability, low hardware requirements, and moderate communication ...
Yuan Cheng+3 more
doaj +4 more sources
A pairwise key pre-distribution scheme for wireless sensor networks [PDF]
To achieve security in wireless sensor networks, it is important to be able to encrypt and authenticate messages sent among sensor nodes. Keys for encryption and authentication purposes must be agreed upon by communicating nodes. Due to resource constraints, achieving such key agreement in wireless sensor networks is non-trivial.
Du, Wenliang Kevin+3 more
+5 more sources
Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks [PDF]
Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no priory knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory.
Camtepe, Seyit, Yener, Bulent
openaire +5 more sources
A Survey on Key Distribution Schemes in Wireless Sensor Networks [PDF]
in this paper, we propose the criteria and classifications of key management schemes in wireless sensor networks, and provide a survey on the key distribution management schemes including basic key pre-distribution schemes, polynomial based key distribution schemes, location based key distribution schemes and key management in hierarchy networks, and ...
Liu He
openaire +4 more sources
Using combined keying materials for key distribution in wireless sensor networks [PDF]
In this paper, we propose a probabilistic key predistribution scheme for wireless sensor networks that increases connectivity of the basic scheme while keeping sizes of keyring and key pool fixed. We introduce the concept of XORed key, which is the bitwise XOR of two regular (a.k.a. single) keys.
Ergun, Murat, Levi, Albert
openaire +5 more sources
Non-Interactive Group Key Pre-Distribution Scheme (GKPS) for End-to-End Routing in Wireless Sensor Networks [PDF]
A novel design of secure end-to-end routing protocol in wireless sensor networks was recently proposed by Harn et al. Their design is based on a group key pre-distribution scheme (GKPS) using a multivariate polynomial. A group key also called a path key,
Ashwag Albakri, Lein Harn
doaj +2 more sources
DHB-KEY: An efficient key distribution scheme for wireless sensor networks [PDF]
Real-world deployments of wireless sensor networks require secure communication. In many application cases it is sufficient to provide message authentication at the sink. To implement this requirement using symmetric ciphers, keys shared between each sensor node and the sink have to be established and kept fresh during network operation.
Tony Chung, Utz Roedig
openaire +2 more sources
Due to their open, expansive, and resource-constrained character, Wireless Sensor Networks (WSNs) face significant energy, efficiency, and security issues. With a fair level of energy and resource consumption, several lightweight cryptographic techniques
Ezhil Roja P., Misbha D.S.
doaj +2 more sources
A Novel Key Pre-distribution for Wireless Sensor Networks
AbstractTo establish the two key in wireless sensor network is a basic security services, forming the basis other security services, such as authentication and encrypted. However, due to the sensor network resource constraints on to establish the two key not wireless sensor networks trivial tasks. The existing key, pre-alpha-ever scheme compromise node
Qian Sun
openaire +3 more sources