Results 21 to 30 of about 121,303 (350)

Improved Key Distribution and Management in Wireless Sensor Network

open access: goldJournal of Wireless Communications, 2016
Key set up and distribution in sensor network is a complex task due to inherent limitations in sensor networks. For reducing the “communication and computation overhead” we proposed that the sensor network is partitioned into different zones. Each zone has a separate intrusion detection system (IDS) and key distribution center (KDC).IDS can detect the ...
Vishal Choudhary, Sunil Taruna
openaire   +3 more sources

On the Performance of a Secure Storage Mechanism for Key Distribution Architectures in Wireless Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2015
Security in wireless sensor networks (WSNs) demands efficient key management schemes. In particular, one of the main research challenges is to ensure secure key storage by sensors due to their constrained resources and high exposure to tampering attempts.
Juliano F. Kazienko   +3 more
doaj   +2 more sources

OVERVIEW ON KEY DISTRIBUTION PRIMITIVES IN WIRELESS SENSOR NETWORK [PDF]

open access: hybridJournal of Computer Science, 2013
Owing to the security requirements of wireless sensor network, the background of Wireless Sensor Network (WSN) is to be analyzed with different threats and attack models. Physical compromising of sensor nodes by an adversary is an emerging problem in sensor network and accordingly, it is necessary to provide an environment with efficient key management
R. Venkatesh   +2 more
openaire   +4 more sources

Synergized security framework: revolutionizing wireless sensor networks through comparative methodological analysis [PDF]

open access: yesScientific Reports
Wireless Sensor Networks (WSNs) are increasingly deployed in critical applications from healthcare to military systems, yet they face significant security challenges due to their resource constraints and distributed nature.
Guodong Su, Boliang Zhang
doaj   +2 more sources

The Study on Key Pre-distribution Methods for Wireless Sensor Networks

open access: goldPhysics Procedia, 2012
AbstractInspired from the key distribution scheme of Du's rectangle scheme, we propose a new hexagon scheme. With the same grid number t and n, the same farthest distance between two neighbor grids R, the new scheme's coverage is 0.5988 larger, and the Pl is higher than Du's method.
Yongjin Liu, Yanan Wang, Huishang Jin
openaire   +3 more sources

Self-Healing Key-Distribution Scheme with Collusion Attack Resistance Based on One-Way Key Chains and Secret Sharing in Wireless Sensor Networks

open access: goldInternational Journal of Distributed Sensor Networks, 2012
In wireless sensor networks, self-healing key-distribution schemes are used to ensure that, even if the message packets that are broadcast in some sessions get lost, the group nodes can still recover the lost session keys simply by using their personal ...
Dong Jiao   +3 more
doaj   +2 more sources

Practical Evaluation of a Secure Key-Distribution and Storage Scheme for Wireless Sensor Networks Using TinyOS

open access: diamondCLEI Electronic Journal, 2011
TinyOS is a major platform broadly used to carry out experiments related to Wireless Sensor Networks (WSNs). A number of researchers claim that cryptographic mechanisms demand plenty of resources from sensors.
Juliano F. Kazienko   +3 more
doaj   +3 more sources

A Flexible and Efficient Key Distribution Scheme for Renewable Wireless Sensor Networks [PDF]

open access: goldEURASIP Journal on Wireless Communications and Networking, 2009
Many applications of wireless sensor network require secure data communications, especially in a hostile environment. In order to protect the sensitive data and the sensor readings, secret keys should be used to encrypt the exchanged messages between communicating nodes.
Victor C. M. Leung, An-Ni Shen, Song Guo
openaire   +5 more sources

A Key Distribution Scheme for Mobile Wireless Sensor Networks: $q$ - $s$ -Composite

open access: yesIEEE Transactions on Information Forensics and Security, 2017
The majority of security systems for wireless sensor networks are based on symmetric encryption. The main open issue for these approaches concerns the establishment of symmetric keys. A promising key distribution technique is the random predistribution of secret keys.
F. Gandino, R. Ferrero, M. Rebaudengo
semanticscholar   +4 more sources

Home - About - Disclaimer - Privacy