Results 281 to 290 of about 95,264 (327)
Some of the next articles are maybe not open access.

A key distribution protocol for Wireless Sensor Networks

37th Annual IEEE Conference on Local Computer Networks, 2012
This paper presents the design, implementation and evaluation of an automated method for distributing symmetric cryptographic keys in a Wireless Sensor Network (WSN). Unlike previous methods for key distribution in WSNs, we do not rely on sensitive knowledge to be stored in program memory prior to network deployment. Additionally, the protocol proposed
Adrian Herrera, Wen Hu
openaire   +1 more source

A Key Distribution Scheme for Wireless Sensor Networks

2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), 2008
Recently, some random key pre-distribution approaches have been proposed for pair-wise key establishment in sensor networks recently. Unfortunately, all of them have the following problem if some sensor nodes are captured by an attacker. Some pair-wise keys of non-captured nodes can be compromised.
Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee
openaire   +1 more source

A Polynomial-Based Key Distribution Approach for Wireless Sensor Networks

Iranian Journal of Science and Technology, Transactions A: Science, 2017
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Moussavi, Alireza, Shamsi, Mostafa
openaire   +1 more source

On the Connectivity of Key-Distribution Strategies in Wireless Sensor Networks

GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference, 2009
Wireless sensor networks (WSNs) are usually missioned to gather critical information in hostile and adversarial environments, which make them susceptible to compromise and revelation. Therefore, establishing secure communication in such networks is of great importance necessitating utilization of efficient key distribution schemes.
H. Shafiei   +4 more
openaire   +1 more source

A key pre-distribution scheme for wireless sensor networks

Symposium, 2005 Wireless Telecommunications, 2006
Key technological advances in wireless communications, micro electro mechanical systems (MEMS), and digital circuitry have energized the research community to focus on the challenges of wireless sensor networks. In this paper, we propose a new pre-distribution key management scheme that meets the operational and security requirements of wireless sensor
A. Price, K. Kosaka, S. Chatterjee
openaire   +1 more source

Distributed Key Certification Using Accumulators for Wireless Sensor Networks

2014
In this work, we propose a key certification protocol for wireless sensor networks that allows nodes to autonomously exchange their public keys and verify their authenticity using one-way accumulators. We examine and compare different accumulator implementations for our protocol on the Sun SPOT platform.
Bae, Jun Young   +3 more
openaire   +2 more sources

A Key Distribution from Pairing for Wireless Sensor Network

2008 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008
The advent of Identity based encryption has enabled a wide range of new cryptographic solutions for wireless sensor network. In this paper, a scheme named KDBSP is given to distribute symmetry key in wireless sensor network KDBSP comes from Smart protocol based on pairing.
Bin Zhu, Jun'Guo Liao
openaire   +1 more source

Efficient key distribution protocol for wireless sensor networks

2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), 2018
Key distribution is a challenging issue for Wireless Sensor Networks (WSNs) because sensor nodes are built from resource-constrained devices that carry limited-power batteries. Thus, a key distribution scheme for WSNs must be efficient — at least in terms of energy consumption and storage.
Majid R Alshammari, Khaled M Elleithy
openaire   +1 more source

Secure key distribution for Wireless Sensor Networks

2008 2nd International Conference on Signal Processing and Communication Systems, 2008
A wireless sensor network (WSN) consists of a large number of small sensor nodes that collect data and send it to a base station, with the help of other nodes. Securing unattended WSNs is a challenging task as networks can be subjected not only to the traditional attacks on wireless networks including eavesdropping and jamming, but also new attacks due
openaire   +1 more source

Mobile Assisted Key Distribution in Wireless Sensor Networks

2011 IEEE International Conference on Communications (ICC), 2011
Many applications in wireless sensor networks (WSNs) demand security. The standart low-power wireless sensors (TmoteSky, MICA2) have severe resource constraints. Despite some work on the adaptation of public-key cryptography to the resource constrained sensors, it is still not obvious whether the resources on the sensors are sufficient for the current ...
Baris Tas, Ali Saman Tosun
openaire   +1 more source

Home - About - Disclaimer - Privacy