Results 11 to 20 of about 1,483,664 (290)
Redundancy in Key Management for WSNs [PDF]
Security in wireless sensor networks is commonly based on symmetric encryption and requires key-management systems to establish and exchange secret keys. A constraint that is common to many key-management approaches is an upper bound to the total number of nodes in the network.
Gandino, Filippo +2 more
openaire +3 more sources
Secure Video Surveillance Framework in Smart City
In the construction process of smart cities, more and more video surveillance systems have been deployed for traffic, office buildings, shopping malls, and families. Thus, the security of video surveillance systems has attracted more attention.
Hao Li +4 more
doaj +1 more source
A Survey of Key Bootstrapping Protocols Based on Public Key Cryptography in the Internet of Things
The Internet of Things envisages connecting all physical objects or things to the Internet, using devices as diverse as smartphones, coffee makers, washing machines, automobiles, lamps, and wearable devices, among many others.
Manisha Malik +2 more
doaj +1 more source
A Survey on Key Management and Authentication Approaches in Smart Metering Systems
The implementation of the smart grid (SG) and cyber-physical systems (CPS) greatly enhances the safety, reliability, and efficiency of energy production and distribution.
Mohamed S. Abdalzaher +4 more
doaj +1 more source
For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving.
Le Xuan Hung +4 more
doaj +1 more source
Authentication and Key Establishment in Dynamic Wireless Sensor Networks
When a sensor node roams within a very large and distributed wireless sensor network, which consists of numerous sensor nodes, its routing path and neighborhood keep changing.
Ying Qiu +3 more
doaj +1 more source
Lightweight and dynamic authenticated key agreement and management protocol for smart grid
With the development of IoT and 5G, the smart grid, as one of the key component for the smart city, can provide the uninterrupted and reliable electricity service by properly adjusting the electricity supply according to the consumption of users.
Feng Zhai +4 more
doaj +1 more source
Key management scheme with private key self-healing ability in DTN
Because of the large delay of DTN network,node cannot receive broadcast updating private key messages in a timely manner,thus unable to update the private key for a certain time period.Aiming at this problem,an allowing private key self-healing ...
De-quan LI,Xi-yong ZHANG,Ting-ting ZHANG +1 more
doaj +1 more source
The Role of Physical Layer Security in IoT: A Novel Perspective
This paper deals with the problem of securing the configuration phase of an Internet of Things (IoT) system. The main drawbacks of current approaches are the focus on specific techniques and methods, and the lack of a cross layer vision of the problem ...
Tommaso Pecorella +2 more
doaj +1 more source
EStore: A User-Friendly Encrypted Storage Scheme for Distributed File Systems
In this paper, we propose a user-friendly encrypted storage scheme named EStore, which is based on the Hadoop distributed file system. Users can make use of cloud-based distributed file systems to collaborate with each other.
Yuxiang Chen +4 more
doaj +1 more source

