Results 31 to 40 of about 123,554 (249)

A Minimal Protocol for Authenticated Key Distribution in Wireless Sensor Networks [PDF]

open access: green2006 Fourth International Conference on Intelligent Sensing and Information Processing, 2006
Kalvinder Singh   +1 more
openalex   +2 more sources

A novel topology optimization of coverage-oriented strategy for wireless sensor networks

open access: yesInternational Journal of Distributed Sensor Networks, 2021
Aiming at the key optimization problems of wireless sensor networks in complex industrial application environments, such as the optimum coverage and the reliability of the network, a novel topology optimization of coverage-oriented strategy for wireless ...
Shuxin Wang   +3 more
doaj   +1 more source

How not to secure wireless sensor networks: a plethora of insecure polynomial‐based key pre‐distribution schemes

open access: yesIET Information Security, 2021
Three closely related polynomial‐based group key pre‐distribution schemes have recently been proposed, aimed specifically at wireless sensor networks.
Chris J Mitchell
doaj   +1 more source

Dynamic key ring update mechanism for mobile wireless sensor networks [PDF]

open access: yes, 2013
Key distribution is an important issue to provide security in Wireless Sensor Networks (WSNs). Many of the key pre-distribution schemes proposed for static WSNs perform poorly when they are applied to Mobile Wireless Sensor Networks (MWSNs).
Levi, Albert   +2 more
core   +2 more sources

Analysis of Elliptic Curve Cryptography (ECC) for Energy Efficiency in Wireless Sensor Networks

open access: yesNUST Journal of Engineering Sciences, 2009
Rapid growth of wireless sensor networks (WSN) in recent times has resulted in greater security requirements. One of the primary concerns in wireless sensor networks is energy efficiency and security mechanisms are no different.
Zain Ul Abideen Tariq   +2 more
doaj   +1 more source

Security Improve in ZigBee Protocol Based on RSA Public Algorithm in WSN [PDF]

open access: yesEngineering and Technology Journal, 2019
ZigBee is consuming low energy and providing the protection in Wireless Sensor Networks. ZigBee pro is supporting most applications. In spite of improved the security, ZigBee pro weak in key administration. In this paper, we depend on Logistic Map Diffie
Nabaa Hasan, Alaa Farhan
doaj   +1 more source

A Distributed Approach to Security in Sensornets [PDF]

open access: yes, 2003
— Secure communication is an important aspect of any network and it has largely remained unexplored in wireless sensor networks (WSN). Security becomes a major challenge because of ad-hoc and resource constrained nature of sensor networks.
Ajay Gupta, Rishi Pidva, Vijay Bhuse
core   +1 more source

Enhancing the Key Pre-distribution Scheme on Wireless Sensor Networks [PDF]

open access: yes, 2008
The communication of a wireless sensor network can be eavesdropped quite easily due to its properties, thereby requiring a security mechanism. Adding a key management scheme on the wireless sensor network is a kind of solution.
Chuan-ming Liu, Tzu-hsuan Shan
core   +1 more source

Quantum walks-based simple authenticated quantum cryptography protocols for secure wireless sensor networks

open access: yesNew Journal of Physics, 2023
Wireless sensor networks (WSNs) play a crucial role in various applications, ranging from environmental monitoring to industrial automation that require high levels of security.
Ahmad Alanezi   +3 more
doaj   +1 more source

Analysis of power optimization and enhanced routing protocols for wireless sensor networks

open access: yesMeasurement: Sensors, 2023
Computers are connected through a network. Wireless sensor nodes are used in sensor networks to keep tabs on their surroundings. The building components of a network are sensor nodes.
D. Hemanand   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy