An Asymmetric Encryption-Based Key Distribution Method for Wireless Sensor Networks
Wireless sensor networks are usually applied in hostile areas where nodes can easily be monitored and captured by an adversary. Designing a key distribution scheme with high security and reliability, low hardware requirements, and moderate communication ...
Yuan Cheng +3 more
doaj +3 more sources
Grid-Based Key Pre-Distribution in Wireless Sensor Networks [PDF]
In this paper, we introduce a grid-based key pre-distribution scheme in wireless sensor networks, which aims to improve the connectivity and resiliency while maintaining a reasonable overhead. We consider simplification of the key establishment logic and enhancement of the connectivity via plat polynomial assignment on a three-dimensional grid for node
Aziz Mohaisen
openalex +2 more sources
Grouping Sensors for the Key Distribution of Implicit Certificates in Wireless Sensor Networks [PDF]
As sensor nodes communicate via wireless channels, information security is essential for wireless sensor networks. Efficient protection mechanisms to ensure data security among nodes are critical. This study developed the bi-directed grouping (top-down grouping (TDG) and bottom-up grouping (BUG)) methods.
Ray-I Chang +2 more
openalex +2 more sources
On the Performance of a Secure Storage Mechanism for Key Distribution Architectures in Wireless Sensor Networks [PDF]
Security in wireless sensor networks (WSNs) demands efficient key management schemes. In particular, one of the main research challenges is to ensure secure key storage by sensors due to their constrained resources and high exposure to tampering attempts.
Juliano F. Kazienko +3 more
doaj +2 more sources
OVERVIEW ON KEY DISTRIBUTION PRIMITIVES IN WIRELESS SENSOR NETWORK [PDF]
Owing to the security requirements of wireless sensor network, the background of Wireless Sensor Network (WSN) is to be analyzed with different threats and attack models. Physical compromising of sensor nodes by an adversary is an emerging problem in sensor network and accordingly, it is necessary to provide an environment with efficient key management
Raghini
openalex +3 more sources
Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design [PDF]
Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before ...
Hamid Haj Seyyed Javadi +1 more
doaj +1 more source
Secure Strategy for Key Pre-Distribution in Wireless Sensor Networks
Wireless sensor networks (WSN) are a collection of sensor nodes, which is deployed spatially among various environments. WSNs are deployed in environments where wired networks are difficult to set up. They are mainly used to record sensitive information regarding physical or environmental conditions.
D.S.S.L. Sruthi +2 more
openalex +2 more sources
Distributed Key Management to Secure IoT Wireless Sensor Networks in Smart-Agro [PDF]
With the deepening of the research and development in the field of embedded devices, the paradigm of the Internet of things (IoT) is gaining momentum. Its technology’s widespread applications increasing the number of connected devices constantly.
Safwan Mawlood Hussein +2 more
doaj +4 more sources
Key distribution and distributed intrusion detection system in wireless sensor network
This thesis proposes a security solution in key management and Intrusion Detection System (IDS) for wireless sensor networks. It addresses challenges of designing in energy and security requirement. Since wireless communication consumes the most energy in sensor network, transmissions must be used efficiently. We propose Hint Key Distribution (HKD) for
Piya Techateerawat
openalex +2 more sources
Due to their open, expansive, and resource-constrained character, Wireless Sensor Networks (WSNs) face significant energy, efficiency, and security issues. With a fair level of energy and resource consumption, several lightweight cryptographic techniques
Ezhil Roja P., Misbha D.S.
doaj +2 more sources

