Results 11 to 20 of about 10,179 (294)

Distributed Key Management to Secure IoT Wireless Sensor Networks in Smart-Agro [PDF]

open access: yesSensors, 2020
With the deepening of the research and development in the field of embedded devices, the paradigm of the Internet of things (IoT) is gaining momentum. Its technology’s widespread applications increasing the number of connected devices constantly.
Safwan Mawlood Hussein   +2 more
doaj   +4 more sources

A pairwise key pre-distribution scheme for wireless sensor networks [PDF]

open access: greenProceedings of the 10th ACM conference on Computer and communication security - CCS '03, 2003
To achieve security in wireless sensor networks, it is important to be able to encrypt and authenticate messages sent among sensor nodes. Keys for encryption and authentication purposes must be agreed upon by communicating nodes. Due to resource constraints, achieving such key agreement in wireless sensor networks is non-trivial.
Wenliang Du   +3 more
  +5 more sources

Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks [PDF]

open access: bronzeIEEE/ACM Transactions on Networking, 2004
Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no priory knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory.
Seyit Camtepe, Bülent Yener
openalex   +5 more sources

A Survey on Key Distribution Schemes in Wireless Sensor Networks [PDF]

open access: goldAdvances in Computer Science Research, 2014
in this paper, we propose the criteria and classifications of key management schemes in wireless sensor networks, and provide a survey on the key distribution management schemes including basic key pre-distribution schemes, polynomial based key distribution schemes, location based key distribution schemes and key management in hierarchy networks, and ...
Liu He
openalex   +4 more sources

DHB-KEY: An efficient key distribution scheme for wireless sensor networks [PDF]

open access: green2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2008
Real-world deployments of wireless sensor networks require secure communication. In many application cases it is sufficient to provide message authentication at the sink. To implement this requirement using symmetric ciphers, keys shared between each sensor node and the sink have to be established and kept fresh during network operation.
Tony Chung, Utz Roedig
openalex   +2 more sources

A Novel Key Pre-distribution for Wireless Sensor Networks

open access: goldPhysics Procedia, 2012
AbstractTo establish the two key in wireless sensor network is a basic security services, forming the basis other security services, such as authentication and encrypted. However, due to the sensor network resource constraints on to establish the two key not wireless sensor networks trivial tasks. The existing key, pre-alpha-ever scheme compromise node
Qian Sun
openalex   +3 more sources

Improved Key Distribution and Management in Wireless Sensor Network

open access: goldJournal of Wireless Communications, 2016
Key set up and distribution in sensor network is a complex task due to inherent limitations in sensor networks. For reducing the “communication and computation overhead” we proposed that the sensor network is partitioned into different zones. Each zone has a separate intrusion detection system (IDS) and key distribution center (KDC).IDS can detect the ...
Vishal Choudhary, S. Taruna
openalex   +3 more sources

A survey of key distribution in wireless sensor networks [PDF]

open access: yesSecurity and Communication Networks, 2011
AbstractKey establishment is the most fundamental cryptographic primitive in all kinds of applications where security is a concern. However, the nature of limited resources on sensor nodes restricts the use of conventional key management techniques in wireless sensor networks.
Chi-Yuan Chen   +2 more
openaire   +1 more source

OVERVIEW ON KEY DISTRIBUTION PRIMITIVES IN WIRELESS SENSOR NETWORK [PDF]

open access: hybridJournal of Computer Science, 2013
Owing to the security requirements of wireless sensor network, the background of Wireless Sensor Network (WSN) is to be analyzed with different threats and attack models. Physical compromising of sensor nodes by an adversary is an emerging problem in sensor network and accordingly, it is necessary to provide an environment with efficient key management
Raghini
openalex   +4 more sources

How not to secure wireless sensor networks: a plethora of insecure polynomial‐based key pre‐distribution schemes

open access: yesIET Information Security, 2021
Three closely related polynomial‐based group key pre‐distribution schemes have recently been proposed, aimed specifically at wireless sensor networks.
Chris J Mitchell
doaj   +1 more source

Home - About - Disclaimer - Privacy