Results 281 to 290 of about 95,264 (327)
Some of the next articles are maybe not open access.
A key distribution protocol for Wireless Sensor Networks
37th Annual IEEE Conference on Local Computer Networks, 2012This paper presents the design, implementation and evaluation of an automated method for distributing symmetric cryptographic keys in a Wireless Sensor Network (WSN). Unlike previous methods for key distribution in WSNs, we do not rely on sensitive knowledge to be stored in program memory prior to network deployment. Additionally, the protocol proposed
Adrian Herrera, Wen Hu
openaire +1 more source
A Key Distribution Scheme for Wireless Sensor Networks
2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), 2008Recently, some random key pre-distribution approaches have been proposed for pair-wise key establishment in sensor networks recently. Unfortunately, all of them have the following problem if some sensor nodes are captured by an attacker. Some pair-wise keys of non-captured nodes can be compromised.
Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee
openaire +1 more source
A Polynomial-Based Key Distribution Approach for Wireless Sensor Networks
Iranian Journal of Science and Technology, Transactions A: Science, 2017zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Moussavi, Alireza, Shamsi, Mostafa
openaire +1 more source
On the Connectivity of Key-Distribution Strategies in Wireless Sensor Networks
GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference, 2009Wireless sensor networks (WSNs) are usually missioned to gather critical information in hostile and adversarial environments, which make them susceptible to compromise and revelation. Therefore, establishing secure communication in such networks is of great importance necessitating utilization of efficient key distribution schemes.
H. Shafiei +4 more
openaire +1 more source
A key pre-distribution scheme for wireless sensor networks
Symposium, 2005 Wireless Telecommunications, 2006Key technological advances in wireless communications, micro electro mechanical systems (MEMS), and digital circuitry have energized the research community to focus on the challenges of wireless sensor networks. In this paper, we propose a new pre-distribution key management scheme that meets the operational and security requirements of wireless sensor
A. Price, K. Kosaka, S. Chatterjee
openaire +1 more source
Distributed Key Certification Using Accumulators for Wireless Sensor Networks
2014In this work, we propose a key certification protocol for wireless sensor networks that allows nodes to autonomously exchange their public keys and verify their authenticity using one-way accumulators. We examine and compare different accumulator implementations for our protocol on the Sun SPOT platform.
Bae, Jun Young +3 more
openaire +2 more sources
A Key Distribution from Pairing for Wireless Sensor Network
2008 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008The advent of Identity based encryption has enabled a wide range of new cryptographic solutions for wireless sensor network. In this paper, a scheme named KDBSP is given to distribute symmetry key in wireless sensor network KDBSP comes from Smart protocol based on pairing.
Bin Zhu, Jun'Guo Liao
openaire +1 more source
Efficient key distribution protocol for wireless sensor networks
2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), 2018Key distribution is a challenging issue for Wireless Sensor Networks (WSNs) because sensor nodes are built from resource-constrained devices that carry limited-power batteries. Thus, a key distribution scheme for WSNs must be efficient — at least in terms of energy consumption and storage.
Majid R Alshammari, Khaled M Elleithy
openaire +1 more source
Secure key distribution for Wireless Sensor Networks
2008 2nd International Conference on Signal Processing and Communication Systems, 2008A wireless sensor network (WSN) consists of a large number of small sensor nodes that collect data and send it to a base station, with the help of other nodes. Securing unattended WSNs is a challenging task as networks can be subjected not only to the traditional attacks on wireless networks including eavesdropping and jamming, but also new attacks due
openaire +1 more source
Mobile Assisted Key Distribution in Wireless Sensor Networks
2011 IEEE International Conference on Communications (ICC), 2011Many applications in wireless sensor networks (WSNs) demand security. The standart low-power wireless sensors (TmoteSky, MICA2) have severe resource constraints. Despite some work on the adaptation of public-key cryptography to the resource constrained sensors, it is still not obvious whether the resources on the sensors are sufficient for the current ...
Baris Tas, Ali Saman Tosun
openaire +1 more source

