Results 21 to 30 of about 95,264 (327)

A survey of key distribution in wireless sensor networks [PDF]

open access: yesSecurity and Communication Networks, 2011
AbstractKey establishment is the most fundamental cryptographic primitive in all kinds of applications where security is a concern. However, the nature of limited resources on sensor nodes restricts the use of conventional key management techniques in wireless sensor networks.
Chi‐Yuan Chen, Han‐Chieh Chao
openaire   +1 more source

A novel topology optimization of coverage-oriented strategy for wireless sensor networks

open access: yesInternational Journal of Distributed Sensor Networks, 2021
Aiming at the key optimization problems of wireless sensor networks in complex industrial application environments, such as the optimum coverage and the reliability of the network, a novel topology optimization of coverage-oriented strategy for wireless ...
Shuxin Wang   +3 more
doaj   +1 more source

Low-Energy Symmetric Key Distribution in Wireless Sensor Networks [PDF]

open access: yesIEEE Transactions on Dependable and Secure Computing, 2011
In this work, a scheme for key distribution and network access in a Wireless Sensor Network (WSN) that utilizes Identity-Based Cryptography (IBC) is presented. The scheme is analyzed on the ARM920T processor and measurements were taken for the runtime and energy of its components.
McCusker, Kealan, O'Connor, Noel E.
openaire   +2 more sources

Random key pre-distribution with transitory master key for wireless sensor networks [PDF]

open access: yesProceedings of the 5th international student workshop on Emerging networking experiments and technologies, 2009
Many Wireless Sensor Networks (WSNs) employ security schemes based on the symmetric encryption, which requires the establishment and management of cryptographic keys. This paper presents a new key management scheme based on Random Key Pre-Distribution. The novelty of the proposed approach is the introduction of a keyed transformation with a Transitory ...
GANDINO, FILIPPO   +2 more
openaire   +2 more sources

How not to secure wireless sensor networks: a plethora of insecure polynomial‐based key pre‐distribution schemes

open access: yesIET Information Security, 2021
Three closely related polynomial‐based group key pre‐distribution schemes have recently been proposed, aimed specifically at wireless sensor networks.
Chris J Mitchell
doaj   +1 more source

Dynamic key ring update mechanism for mobile wireless sensor networks [PDF]

open access: yes, 2013
Key distribution is an important issue to provide security in Wireless Sensor Networks (WSNs). Many of the key pre-distribution schemes proposed for static WSNs perform poorly when they are applied to Mobile Wireless Sensor Networks (MWSNs).
Levi, Albert   +2 more
core   +2 more sources

Analysis of Elliptic Curve Cryptography (ECC) for Energy Efficiency in Wireless Sensor Networks

open access: yesNUST Journal of Engineering Sciences, 2009
Rapid growth of wireless sensor networks (WSN) in recent times has resulted in greater security requirements. One of the primary concerns in wireless sensor networks is energy efficiency and security mechanisms are no different.
Zain Ul Abideen Tariq   +2 more
doaj   +1 more source

Security Improve in ZigBee Protocol Based on RSA Public Algorithm in WSN [PDF]

open access: yesEngineering and Technology Journal, 2019
ZigBee is consuming low energy and providing the protection in Wireless Sensor Networks. ZigBee pro is supporting most applications. In spite of improved the security, ZigBee pro weak in key administration. In this paper, we depend on Logistic Map Diffie
Nabaa Hasan, Alaa Farhan
doaj   +1 more source

A Distributed Approach to Security in Sensornets [PDF]

open access: yes, 2003
— Secure communication is an important aspect of any network and it has largely remained unexplored in wireless sensor networks (WSN). Security becomes a major challenge because of ad-hoc and resource constrained nature of sensor networks.
Ajay Gupta, Rishi Pidva, Vijay Bhuse
core   +1 more source

Distributed Key Management to Secure IoT Wireless Sensor Networks in Smart-Agro

open access: yesSensors, 2020
With the deepening of the research and development in the field of embedded devices, the paradigm of the Internet of things (IoT) is gaining momentum. Its technology’s widespread applications increasing the number of connected devices constantly.
Safwan Mawlood Hussein   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy