Results 41 to 50 of about 123,554 (249)

Uneven key pre-distribution scheme for multi-phase wireless sensor networks [PDF]

open access: yes, 2013
In multi-phase Wireless Sensor Networks (WSNs), sensor nodes are redeployed periodically to replace nodes whose batteries are depleted. In order to keep the network resilient against node capture attacks across different deployment epochs, called ...
Catakoglu, Abdullah Onur   +2 more
core   +2 more sources

A highly resilient and zone-based key predistribution protocol for multiphase wireless sensor networks [PDF]

open access: yes, 2009
Pairwise key distribution among the sensor nodes is an essential problem for providing security in Wireless Sensor Networks (WSNs). The common approach for this problem is random key predistribution, which suffers from resiliency issues in case of node ...
Kalkan, Kubra   +6 more
core   +2 more sources

A Collaborative Data Gathering Mechanism Based on Fuzzy Decision for Wireless Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2015
In spite of the increasing demand for all kinds of sensing services and applications, there still lacks a clear understanding of collaborative techniques to design collaborative protocols for wireless sensor networks.
Wen Si, Hui-yuan Shi, Pan Liu
doaj   +1 more source

Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design [PDF]

open access: yesJournal of Advances in Computer Engineering and Technology, 2015
Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before ...
Hamid Haj Seyyed Javadi   +1 more
doaj  

Secure and Lightweight Key Distribution with ZigBee Pro for Ubiquitous Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2013
We propose a secure and lightweight key distribution mechanism using ZigBee Pro for ubiquitous sensor networks. ZigBee consumes low power and provides security in wireless sensor networks.
Kyung Choi, Mihui Kim, Kijoon Chae
doaj   +1 more source

Quarantine region scheme to mitigate spam attacks in wireless sensor networks [PDF]

open access: yes, 2006
The Quarantine Region Scheme (QRS) is introduced to defend against spam attacks in wireless sensor networks where malicious antinodes frequently generate dummy spam messages to be relayed toward the sink.
Cayirci, Erdal   +5 more
core   +1 more source

Hypercube Bivariate-Based Key Management for Wireless Sensor Networks [PDF]

open access: yesJournal of Sciences, Islamic Republic of Iran, 2017
Wireless sensor networks are composed of very small devices, called sensor nodes,for numerous applications in the environment. In adversarial environments, the securitybecomes a crucial issue in wireless sensor networks (WSNs).
I. Qasemzadeh Kolagar   +2 more
doaj  

Mutual trust method for forwarding information in wireless sensor networks using random secret pre-distribution

open access: yesAdvances in Mechanical Engineering, 2016
In wireless sensor networks, sensing information must be transmitted from sensor nodes to the base station by multiple hopping. Every sensor node is a sender and a relay node that forwards the sensing information that is sent by other nodes.
Chih-Hsueh Lin   +5 more
doaj   +1 more source

Security in Wireless Sensor Networks: Issues and Challenges [PDF]

open access: yes, 2006
Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military.
Delic, H, Ersoy, C, Onel, T, Onur, Ertan
core   +3 more sources

A Hybrid Key Management Scheme for WSNs Based on PPBR and a Tree-Based Path Key Establishment Method

open access: yesSensors, 2016
With the development of wireless sensor networks (WSNs), in most application scenarios traditional WSNs with static sink nodes will be gradually replaced by Mobile Sinks (MSs), and the corresponding application requires a secure communication environment.
Ying Zhang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy