An Asymmetric Encryption-Based Key Distribution Method for Wireless Sensor Networks [PDF]
Wireless sensor networks are usually applied in hostile areas where nodes can easily be monitored and captured by an adversary. Designing a key distribution scheme with high security and reliability, low hardware requirements, and moderate communication ...
Yuan Cheng+3 more
doaj +5 more sources
Efficient and Secure Key Distribution Protocol for Wireless Sensor Networks [PDF]
Modern wireless sensor networks have adopted the IEEE 802.15.4 standard. This standard defines the first two layers, the physical and medium access control layers; determines the radio wave used for communication; and defines the 128-bit advanced ...
Majid R. Alshammari+1 more
doaj +6 more sources
A pairwise key pre-distribution scheme for wireless sensor networks [PDF]
To achieve security in wireless sensor networks, it is important to be able to encrypt and authenticate messages sent among sensor nodes. Keys for encryption and authentication purposes must be agreed upon by communicating nodes. Due to resource constraints, achieving such key agreement in wireless sensor networks is non-trivial.
Wenliang Du+3 more
semanticscholar +5 more sources
Non-Interactive Group Key Pre-Distribution Scheme (GKPS) for End-to-End Routing in Wireless Sensor Networks [PDF]
A novel design of secure end-to-end routing protocol in wireless sensor networks was recently proposed by Harn et al. Their design is based on a group key pre-distribution scheme (GKPS) using a multivariate polynomial. A group key also called a path key,
Ashwag Albakri, Lein Harn
doaj +3 more sources
A Hybrid Key Pre-Distribution Scheme for Securing Communications in Wireless Sensor Networks
Wireless Sensor Network (WSN) is a type of ad hoc networks which consist of hundreds to thousands of sensor nodes. These sensor nodes collaborate to surveillance environment.
Mojtaba Jamshidi+3 more
doaj +4 more sources
A survey of key distribution in wireless sensor networks [PDF]
Key establishment is the most fundamental cryptographic primitive in all kinds of applications where security is a concern. However, the nature of limited resources on sensor nodes restricts the use of conventional key management techniques in wireless ...
Chi-Yuan Chen, H. Chao
semanticscholar +2 more sources
PUF-based Key Distribution in Wireless Sensor Networks
Physical Unclonable Functions (PUFs) can be seen as kind of hardware oneway functions, who are easily fabricated but difficult to clone, duplicate or predict.
Zheng Zhang+5 more
semanticscholar +2 more sources
Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks [PDF]
Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no priory knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory.
Camtepe, Seyit, Yener, Bulent
openaire +5 more sources
Grouping Sensors for the Key Distribution of Implicit Certificates in Wireless Sensor Networks
As sensor nodes communicate via wireless channels, information security is essential for wireless sensor networks. Efficient protection mechanisms to ensure data security among nodes are critical.
R. Chang, Chien-Wen Chiang, Y. Hung
semanticscholar +2 more sources
A Survey on Key Distribution Schemes in Wireless Sensor Networks [PDF]
in this paper, we propose the criteria and classifications of key management schemes in wireless sensor networks, and provide a survey on the key distribution management schemes including basic key pre-distribution schemes, polynomial based key distribution schemes, location based key distribution schemes and key management in hierarchy networks, and ...
Liu He
openaire +4 more sources