A pairwise key pre-distribution scheme for wireless sensor networks [PDF]
Proceedings of the 10th ACM conference on Computer and communication security - CCS '03, 2003To achieve security in wireless sensor networks, it is important to be able to encrypt and authenticate messages sent among sensor nodes. Keys for encryption and authentication purposes must be agreed upon by communicating nodes.
Wenliang Du+3 more
semanticscholar +5 more sources
Efficient and Secure Key Distribution Protocol for Wireless Sensor Networks [PDF]
Sensors, 2018Modern wireless sensor networks have adopted the IEEE 802.15.4 standard. This standard defines the first two layers, the physical and medium access control layers; determines the radio wave used for communication; and defines the 128-bit advanced ...
Majid Alshammari, Khaled Elleithy
semanticscholar +6 more sources
An Asymmetric Encryption-Based Key Distribution Method for Wireless Sensor Networks [PDF]
Sensors, 2023Wireless sensor networks are usually applied in hostile areas where nodes can easily be monitored and captured by an adversary. Designing a key distribution scheme with high security and reliability, low hardware requirements, and moderate communication ...
Yuan Cheng+3 more
semanticscholar +4 more sources
A survey of key distribution in wireless sensor networks [PDF]
Security and Communication Networks, 2014Key establishment is the most fundamental cryptographic primitive in all kinds of applications where security is a concern. However, the nature of limited resources on sensor nodes restricts the use of conventional key management techniques in wireless ...
Chi-Yuan Chen, H. Chao
semanticscholar +2 more sources
PUF-based Key Distribution in Wireless Sensor Networks
Computers, Materials & Continua, 2020Physical Unclonable Functions (PUFs) can be seen as kind of hardware oneway functions, who are easily fabricated but difficult to clone, duplicate or predict.
Zheng Zhang+5 more
semanticscholar +2 more sources
Hierarchical Grid-Based Pairwise Key Pre-distribution in Wireless Sensor Networks [PDF]
arXiv, 2008The security of wireless sensor networks is an active topic of research where both symmetric and asymmetric key cryptography issues have been studied. Due to their computational feasibility on typical sensor nodes, symmetric key algorithms that use the same key to encrypt and decrypt messages have been intensively studied and perfectly deployed in such
Aziz Mohaisen+2 more
arxiv +3 more sources
Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks [PDF]
IEEE/ACM Transactions on Networking, 2004Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no priory knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory.
Seyit Camtepe, Bülent Yener
openalex +5 more sources
Grouping Sensors for the Key Distribution of Implicit Certificates in Wireless Sensor Networks
Electronics, 2023As sensor nodes communicate via wireless channels, information security is essential for wireless sensor networks. Efficient protection mechanisms to ensure data security among nodes are critical.
R. Chang, Chien-Wen Chiang, Y. Hung
semanticscholar +2 more sources
Non-Interactive Group Key Pre-Distribution Scheme (GKPS) for End-to-End Routing in Wireless Sensor Networks [PDF]
IEEE Access, 2019A novel design of secure end-to-end routing protocol in wireless sensor networks was recently proposed by Harn et al. Their design is based on a group key pre-distribution scheme (GKPS) using a multivariate polynomial. A group key also called a path key,
Ashwag Albakri, Lein Harn
openalex +2 more sources
Low-Energy Symmetric Key Distribution in Wireless Sensor Networks [PDF]
IEEE Transactions on Dependable and Secure Computing, 2011In this work, a scheme for key distribution and network access in a Wireless Sensor Network (WSN) that utilizes Identity-Based Cryptography (IBC) is presented.
K. McCusker, N. O’Connor
semanticscholar +4 more sources