Results 41 to 50 of about 121,303 (350)

Uneven key pre-distribution scheme for multi-phase wireless sensor networks [PDF]

open access: yes, 2013
In multi-phase Wireless Sensor Networks (WSNs), sensor nodes are redeployed periodically to replace nodes whose batteries are depleted. In order to keep the network resilient against node capture attacks across different deployment epochs, called ...
Catakoglu, Abdullah Onur   +2 more
core   +2 more sources

A highly resilient and zone-based key predistribution protocol for multiphase wireless sensor networks [PDF]

open access: yes, 2009
Pairwise key distribution among the sensor nodes is an essential problem for providing security in Wireless Sensor Networks (WSNs). The common approach for this problem is random key predistribution, which suffers from resiliency issues in case of node ...
Kalkan, Kubra   +6 more
core   +2 more sources

A Security Framework for Wireless Sensor Networks Utilizing a Unique Session Key [PDF]

open access: yes, 2008
Key management is a core mechanism to ensure the security of applications and network services in wireless sensor networks. It includes two aspects: key distribution and key revocation.
Ramamurthy, Byrav   +3 more
core   +2 more sources

A Collaborative Data Gathering Mechanism Based on Fuzzy Decision for Wireless Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2015
In spite of the increasing demand for all kinds of sensing services and applications, there still lacks a clear understanding of collaborative techniques to design collaborative protocols for wireless sensor networks.
Wen Si, Hui-yuan Shi, Pan Liu
doaj   +1 more source

Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design [PDF]

open access: yesJournal of Advances in Computer Engineering and Technology, 2015
Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before ...
Hamid Haj Seyyed Javadi   +1 more
doaj  

Secure and Lightweight Key Distribution with ZigBee Pro for Ubiquitous Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2013
We propose a secure and lightweight key distribution mechanism using ZigBee Pro for ubiquitous sensor networks. ZigBee consumes low power and provides security in wireless sensor networks.
Kyung Choi, Mihui Kim, Kijoon Chae
doaj   +1 more source

Hypercube Bivariate-Based Key Management for Wireless Sensor Networks [PDF]

open access: yesJournal of Sciences, Islamic Republic of Iran, 2017
Wireless sensor networks are composed of very small devices, called sensor nodes,for numerous applications in the environment. In adversarial environments, the securitybecomes a crucial issue in wireless sensor networks (WSNs).
I. Qasemzadeh Kolagar   +2 more
doaj  

Mutual trust method for forwarding information in wireless sensor networks using random secret pre-distribution

open access: yesAdvances in Mechanical Engineering, 2016
In wireless sensor networks, sensing information must be transmitted from sensor nodes to the base station by multiple hopping. Every sensor node is a sender and a relay node that forwards the sensing information that is sent by other nodes.
Chih-Hsueh Lin   +5 more
doaj   +1 more source

A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks [PDF]

open access: yes, 2005
To achieve security in wireless sensor networks, it is important to be able to encrypt and authenticate messages sent between sensor nodes. Before doing so, keys for performing encryption and authentication must be agreed upon by the communicating ...
Deng, Jing   +1 more
core   +1 more source

A Hybrid Key Management Scheme for WSNs Based on PPBR and a Tree-Based Path Key Establishment Method

open access: yesSensors, 2016
With the development of wireless sensor networks (WSNs), in most application scenarios traditional WSNs with static sink nodes will be gradually replaced by Mobile Sinks (MSs), and the corresponding application requires a secure communication environment.
Ying Zhang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy