Results 1 to 10 of about 95,264 (327)

On the Performance of a Secure Storage Mechanism for Key Distribution Architectures in Wireless Sensor Networks [PDF]

open access: goldInternational Journal of Distributed Sensor Networks, 2015
Security in wireless sensor networks (WSNs) demands efficient key management schemes. In particular, one of the main research challenges is to ensure secure key storage by sensors due to their constrained resources and high exposure to tampering attempts.
Juliano F. Kazienko   +3 more
doaj   +2 more sources

Secure Key Distribution Using Fragmentation and Assimilation in Wireless Sensor and Actor Networks

open access: goldInternational Journal of Distributed Sensor Networks, 2015
Secure key distribution is one of the most important building blocks to ensure confidentiality in wireless sensor and actor networks (WSANs). However, the key distribution becomes a challenging task when keys have to be relayed by compromised nodes in ...
AtaUllah Ghafoor   +3 more
doaj   +2 more sources

Efficient and Secure Key Distribution Protocol for Wireless Sensor Networks [PDF]

open access: yesSensors, 2018
Modern wireless sensor networks have adopted the IEEE 802.15.4 standard. This standard defines the first two layers, the physical and medium access control layers; determines the radio wave used for communication; and defines the 128-bit advanced ...
Majid R. Alshammari   +1 more
doaj   +3 more sources

Non-Interactive Group Key Pre-Distribution Scheme (GKPS) for End-to-End Routing in Wireless Sensor Networks [PDF]

open access: goldIEEE Access, 2019
A novel design of secure end-to-end routing protocol in wireless sensor networks was recently proposed by Harn et al. Their design is based on a group key pre-distribution scheme (GKPS) using a multivariate polynomial. A group key also called a path key,
Ashwag Albakri, Lein Harn
doaj   +2 more sources

An Asymmetric Encryption-Based Key Distribution Method for Wireless Sensor Networks

open access: yesSensors, 2023
Wireless sensor networks are usually applied in hostile areas where nodes can easily be monitored and captured by an adversary. Designing a key distribution scheme with high security and reliability, low hardware requirements, and moderate communication ...
Yuan Cheng   +3 more
doaj   +3 more sources

Implementation of Elliptic Curves in the Polynomial Blom Key Pre-Distribution Scheme for Wireless Sensor Networks and Distributed Ledger Technology [PDF]

open access: goldJournal of Sensor and Actuator Networks, 2023
One of the challenges in securing wireless sensor networks (WSNs) is the key distribution; that is, a single shared key must first be known to a pair of communicating nodes before they can proceed with the secure encryption and decryption of the data. In
Siti Noor Farwina Mohamad Anwar Antony   +1 more
doaj   +2 more sources

Survey of Key Distribution Schemes for Wireless Sensor Networks [PDF]

open access: green, 2014
This paper presents a survey of key distribution schemes for wireless sensor networks. This survey includes the new approach of key distribution using the piggy bank method. Different Network architectures and different key pre-distribution schemes are described.
Pratik P. Chaphekar
openalex   +3 more sources

Using combined keying materials for key distribution in wireless sensor networks [PDF]

open access: yes21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, 2010
In this paper, we propose a probabilistic key predistribution scheme for wireless sensor networks that increases connectivity of the basic scheme while keeping sizes of keyring and key pool fixed.
Ergun, Murat, Levi, Albert
core   +3 more sources

Grouping Sensors for the Key Distribution of Implicit Certificates in Wireless Sensor Networks [PDF]

open access: goldElectronics, 2023
As sensor nodes communicate via wireless channels, information security is essential for wireless sensor networks. Efficient protection mechanisms to ensure data security among nodes are critical. This study developed the bi-directed grouping (top-down grouping (TDG) and bottom-up grouping (BUG)) methods.
Ray-I Chang   +2 more
openalex   +2 more sources

Improved Key Distribution and Management in Wireless Sensor Network

open access: diamondJournal of Wireless Communications, 2016
Key set up and distribution in sensor network is a complex task due to inherent limitations in sensor networks. For reducing the “communication and computation overhead” we proposed that the sensor network is partitioned into different zones. Each zone has a separate intrusion detection system (IDS) and key distribution center (KDC).IDS can detect the ...
Vishal Choudhary, S. Taruna
openalex   +3 more sources

Home - About - Disclaimer - Privacy