Results 251 to 260 of about 10,179 (294)
Some of the next articles are maybe not open access.

Distributed key management for wireless sensor networks

Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks, 2009
The recent research in sensor networks has led to a number of security schemes. The main requirement of wireless sensor networks is not only security but energy efficient security due to resource constrained nature of sensor nodes. We have developed an energy and storage efficient key distribution scheme using leveling and sectoring.
Ramamurthy Garimella, Kuldeep
openaire   +2 more sources

A Key Distribution Scheme for Wireless Sensor Networks

2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), 2008
Recently, some random key pre-distribution approaches have been proposed for pair-wise key establishment in sensor networks recently. Unfortunately, all of them have the following problem if some sensor nodes are captured by an attacker. Some pair-wise keys of non-captured nodes can be compromised.
Dong-Hoon Lee, Hwaseong Lee, Yong Ho Kim
openaire   +2 more sources

A key pre-distribution scheme for wireless sensor networks

Symposium, 2005 Wireless Telecommunications, 2006
Key technological advances in wireless communications, micro electro mechanical systems (MEMS), and digital circuitry have energized the research community to focus on the challenges of wireless sensor networks. In this paper, we propose a new pre-distribution key management scheme that meets the operational and security requirements of wireless sensor
K. Kosaka, Samir Chatterjee, A. Price
openaire   +2 more sources

Efficient key distribution protocol for wireless sensor networks

2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), 2018
Key distribution is a challenging issue for Wireless Sensor Networks (WSNs) because sensor nodes are built from resource-constrained devices that carry limited-power batteries. Thus, a key distribution scheme for WSNs must be efficient — at least in terms of energy consumption and storage.
Khaled M. Elleithy, Majid Alshammari
openaire   +2 more sources

Mobile Assisted Key Distribution in Wireless Sensor Networks

2011 IEEE International Conference on Communications (ICC), 2011
Many applications in wireless sensor networks (WSNs) demand security. The standart low-power wireless sensors (TmoteSky, MICA2) have severe resource constraints. Despite some work on the adaptation of public-key cryptography to the resource constrained sensors, it is still not obvious whether the resources on the sensors are sufficient for the current ...
Ali Saman Tosun, Baris Tas
openaire   +2 more sources

A Distributed Key Management Protocol for Wireless Sensor Network [PDF]

open access: possible, 2018
In sensor network where large group of nodes share the information, in such scenario it’s difficult to scale the application, in addition security in wireless sensor network often vary with purpose and context, but in broad-spectrum, security for wireless sensor networks should centered on the protection of the data itself and the network ...
Vishal Choudhary, Sunil Taruna
openaire   +1 more source

A Key Distribution from Pairing for Wireless Sensor Network

2008 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008
The advent of Identity based encryption has enabled a wide range of new cryptographic solutions for wireless sensor network. In this paper, a scheme named KDBSP is given to distribute symmetry key in wireless sensor network KDBSP comes from Smart protocol based on pairing.
Zhu Bin, Liao Jun'guo
openaire   +2 more sources

Using Trust in Key Distribution in Wireless Sensor Networks

2007 IEEE Globecom Workshops, 2007
This paper presents a new approach of dynamic symmetric key distribution for encrypting the communication between two nodes in a wireless sensor network (WSN). The distribution of a shared key can be performed by any sensor node and does not always require that it is performed by the base station (BS).
N. Lewis, N. Foukia
openaire   +2 more sources

Initial Key Distribution for Industrial Wireless Sensor Networks

2013 IEEE International Conference on Industrial Technology (ICIT), 2013
In any security design, the initial secret distribution for further key management solution is a major step. In industrial wireless sensor networks also, initial bootstrapping of the trust in the system is a major concern. The plant can be assumed to be a closed system, where only authenticated and trusted users are allowed to enter.
Mikael Gidlund   +3 more
openaire   +2 more sources

Secure key distribution for Wireless Sensor Networks

2008 2nd International Conference on Signal Processing and Communication Systems, 2008
A wireless sensor network (WSN) consists of a large number of small sensor nodes that collect data and send it to a base station, with the help of other nodes. Securing unattended WSNs is a challenging task as networks can be subjected not only to the traditional attacks on wireless networks including eavesdropping and jamming, but also new attacks due
openaire   +2 more sources

Home - About - Disclaimer - Privacy