Results 21 to 30 of about 11,266 (293)

Cryptographic key distribution in wireless sensor networks: a hardware perspective [PDF]

open access: green, 2008
In this work the suitability of different methods of symmetric key distribution for application in wireless sensor networks are discussed. Each method is considered in terms of its security implications for the network. It is concluded that an asymmetric scheme is the optimum choice for key distribution. In particular, Identity-Based Cryptography (IBC)
Kealan McCusker
openalex   +2 more sources

Secure Multipath Routing Scheme Using Key Pre-Distribution in Wireless Sensor Networks [PDF]

open access: greenInternational Journal in Foundations of Computer Science & Technology, 2014
Multipath routing in WSN has been a long wish in security scenario where nodes on next-hop may be targeted to compromise. Many proposals of Multipath routing has been proposed in ADHOC Networks but under constrained from keying environment most seems ignorant.
Kamal Kumar, Verma A.K, Patel R.B
openalex   +4 more sources

Efficient key distribution for secure and energy-optimized communication in wireless sensor network using bioinspired algorithms

open access: goldAlexandria Engineering Journal
Wireless Sensor Networks (WSNs) play a major part in numerous applications such as smart agriculture, healthcare, and environmental monitoring. Safeguarding protected communication in this network is dominant.
Adil O. Khadidos   +5 more
doaj   +2 more sources

Low-Energy Symmetric Key Distribution in Wireless Sensor Networks [PDF]

open access: yesIEEE Transactions on Dependable and Secure Computing, 2011
In this work, a scheme for key distribution and network access in a Wireless Sensor Network (WSN) that utilizes Identity-Based Cryptography (IBC) is presented. The scheme is analyzed on the ARM920T processor and measurements were taken for the runtime and energy of its components.
McCusker, Kealan, O'Connor, Noel E.
openaire   +2 more sources

A novel topology optimization of coverage-oriented strategy for wireless sensor networks

open access: yesInternational Journal of Distributed Sensor Networks, 2021
Aiming at the key optimization problems of wireless sensor networks in complex industrial application environments, such as the optimum coverage and the reliability of the network, a novel topology optimization of coverage-oriented strategy for wireless ...
Shuxin Wang   +3 more
doaj   +1 more source

Group-based key pre-distribution in wireless sensor networks [PDF]

open access: yesProceedings of the 4th ACM workshop on Wireless security, 2005
Many key pre-distribution techniques have been developed recently to establish pairwise keys for wireless sensor networks. To further improve these schemes, researchers have proposed to take advantage of sensors' expected locations to help pre-distributing keying materials.
Donggang Liu, Peng Ning, Wenliang Du
openaire   +1 more source

A survey of key distribution in wireless sensor networks [PDF]

open access: yesSecurity and Communication Networks, 2011
AbstractKey establishment is the most fundamental cryptographic primitive in all kinds of applications where security is a concern. However, the nature of limited resources on sensor nodes restricts the use of conventional key management techniques in wireless sensor networks.
Chi‐Yuan Chen, Han‐Chieh Chao
openaire   +1 more source

Analysis of Elliptic Curve Cryptography (ECC) for Energy Efficiency in Wireless Sensor Networks

open access: yesNUST Journal of Engineering Sciences, 2009
Rapid growth of wireless sensor networks (WSN) in recent times has resulted in greater security requirements. One of the primary concerns in wireless sensor networks is energy efficiency and security mechanisms are no different.
Zain Ul Abideen Tariq   +2 more
doaj   +1 more source

How not to secure wireless sensor networks: a plethora of insecure polynomial‐based key pre‐distribution schemes

open access: yesIET Information Security, 2021
Three closely related polynomial‐based group key pre‐distribution schemes have recently been proposed, aimed specifically at wireless sensor networks.
Chris J Mitchell
doaj   +1 more source

Security Improve in ZigBee Protocol Based on RSA Public Algorithm in WSN [PDF]

open access: yesEngineering and Technology Journal, 2019
ZigBee is consuming low energy and providing the protection in Wireless Sensor Networks. ZigBee pro is supporting most applications. In spite of improved the security, ZigBee pro weak in key administration. In this paper, we depend on Logistic Map Diffie
Nabaa Hasan, Alaa Farhan
doaj   +1 more source

Home - About - Disclaimer - Privacy