Uneven key pre-distribution scheme for multi-phase wireless sensor networks [PDF]
In multi-phase Wireless Sensor Networks (WSNs), sensor nodes are redeployed periodically to replace nodes whose batteries are depleted. In order to keep the network resilient against node capture attacks across different deployment epochs, called ...
Catakoglu, Abdullah Onur+2 more
core +2 more sources
A highly resilient and zone-based key predistribution protocol for multiphase wireless sensor networks [PDF]
Pairwise key distribution among the sensor nodes is an essential problem for providing security in Wireless Sensor Networks (WSNs). The common approach for this problem is random key predistribution, which suffers from resiliency issues in case of node ...
Kalkan, Kubra+6 more
core +2 more sources
A Collaborative Data Gathering Mechanism Based on Fuzzy Decision for Wireless Sensor Networks
In spite of the increasing demand for all kinds of sensing services and applications, there still lacks a clear understanding of collaborative techniques to design collaborative protocols for wireless sensor networks.
Wen Si, Hui-yuan Shi, Pan Liu
doaj +1 more source
Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design [PDF]
Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before ...
Hamid Haj Seyyed Javadi+1 more
doaj
Secure and Lightweight Key Distribution with ZigBee Pro for Ubiquitous Sensor Networks
We propose a secure and lightweight key distribution mechanism using ZigBee Pro for ubiquitous sensor networks. ZigBee consumes low power and provides security in wireless sensor networks.
Kyung Choi, Mihui Kim, Kijoon Chae
doaj +1 more source
Quarantine region scheme to mitigate spam attacks in wireless sensor networks [PDF]
The Quarantine Region Scheme (QRS) is introduced to defend against spam attacks in wireless sensor networks where malicious antinodes frequently generate dummy spam messages to be relayed toward the sink.
Cayirci, Erdal+5 more
core +1 more source
Hypercube Bivariate-Based Key Management for Wireless Sensor Networks [PDF]
Wireless sensor networks are composed of very small devices, called sensor nodes,for numerous applications in the environment. In adversarial environments, the securitybecomes a crucial issue in wireless sensor networks (WSNs).
I. Qasemzadeh Kolagar+2 more
doaj
In wireless sensor networks, sensing information must be transmitted from sensor nodes to the base station by multiple hopping. Every sensor node is a sender and a relay node that forwards the sensing information that is sent by other nodes.
Chih-Hsueh Lin+5 more
doaj +1 more source
Security in Wireless Sensor Networks: Issues and Challenges [PDF]
Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military.
Delic, H, Ersoy, C, Onel, T, Onur, Ertan
core +3 more sources
A Hybrid Key Management Scheme for WSNs Based on PPBR and a Tree-Based Path Key Establishment Method
With the development of wireless sensor networks (WSNs), in most application scenarios traditional WSNs with static sink nodes will be gradually replaced by Mobile Sinks (MSs), and the corresponding application requires a secure communication environment.
Ying Zhang+3 more
doaj +1 more source